Auto-Update: 2024-03-15T15:00:38.131917+00:00

This commit is contained in:
cad-safe-bot 2024-03-15 15:03:28 +00:00
parent aa30afe95c
commit d0fad50139
30 changed files with 2106 additions and 177 deletions

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-48788",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-03-12T15:15:46.973",
"lastModified": "2024-03-12T16:02:33.900",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-15T14:52:23.887",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets."
},
{
"lang": "es",
"value": "Una neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando sql (\"inyecci\u00f3n sql\") en Fortinet FortiClientEMS versi\u00f3n 7.2.0 a 7.2.2, FortiClientEMS 7.0.1 a 7.0.10 permite a un atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de paquetes especialmente manipulados."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -46,10 +70,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticlient_enterprise_management_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.1",
"versionEndIncluding": "7.0.10",
"matchCriteriaId": "CA97EA36-75D0-40DA-98CD-4C94E061A28F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticlient_enterprise_management_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndIncluding": "7.2.2",
"matchCriteriaId": "3C4BC53A-0E69-4CDE-B89A-E6AAC3ADB1E0"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-430",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-50861",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-15T14:15:07.207",
"lastModified": "2024-03-15T14:15:07.207",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in realmag777 HUSKY \u2013 Products Filter for WooCommerce (formerly WOOF).This issue affects HUSKY \u2013 Products Filter for WooCommerce (formerly WOOF): from n/a through 1.3.4.3.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woocommerce-products-filter/wordpress-husky-plugin-1-3-4-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-51525",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-15T14:15:07.457",
"lastModified": "2024-03-15T14:15:07.457",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Veribo, Roland Murg WP Simple Booking Calendar.This issue affects WP Simple Booking Calendar: from n/a through 2.0.8.4.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-simple-booking-calendar/wordpress-wp-simple-booking-calendar-plugin-2-0-8-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52434",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-20T18:15:50.790",
"lastModified": "2024-03-01T14:15:53.143",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-15T14:21:29.950",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,27 +14,116 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: smb: cliente: corrige OOB potenciales en smb2_parse_contexts() Valida compensaciones y longitudes antes de desreferenciar crea contextos en smb2_parse_contexts(). Esto corrige los siguientes errores al acceder a contextos de creaci\u00f3n no v\u00e1lidos desde el servidor: ERROR: no se puede manejar el error de p\u00e1gina para la direcci\u00f3n: ffff8881178d8cc3 #PF: acceso de lectura del supervisor en modo kernel #PF: error_code(0x0000) - p\u00e1gina no presente PGD 4a01067 P4D 4a01067 PUD 0 Ups: 0000 [#1] PREEMPT SMP NOPTI CPU: 3 PID: 1736 Comm: mount.cifs No est\u00e1 contaminado 6.7.0-rc4 #1 Nombre de hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.2 -3-gd478f380-rebuilt.opensuse.org 04/04/2014 RIP: 0010: SMB2_PARSE_CONTEXTS+0XA0/0X3A0 [CIFS] C\u00f3digo: F8 10 75 13 48 B8 93 AD 25 50 9C B4 11 E7 49 39 06 0f 84 D2 00 00 00 8b 45 00 85 c0 74 61 41 29 c5 48 01 c5 41 83 fd 0f 76 55 <0f> b7 7d 04 0f b7 45 06 4c 8d 74 3d 00 66 83 f8 04 75 bc ba 04 00 RSP: 0018:ffffc900007939e0 EFLAGS: 00010216 RAX: ffffc90000793c78 RBX: ffff8880180cc000 RCX: ffffc90000793c90 RDX: ffffc90000793cc0 RSI: ffff8880178d8cc0 RDI: ffff8880180cc000 RBP: ffff8881178d8cbf R08: ffffc90000793c22 R09: 0000000000000000 R10: ffff8880180cc000 R11: 00000000000000024 R12: 0000000000000000 R13: 0000000 000000020 R14: 00000000000000000 R15: ffffc90000793c22 FS: 00007f873753cbc0(0000) GS:ffff88806bc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff8881178d8cc3 CR3 : 00000000181ca000 CR4: 0000000000750ef0 PKRU: 55555554 Seguimiento de llamadas: ? __morir+0x23/0x70 ? page_fault_oops+0x181/0x480? search_module_extables+0x19/0x60? srso_alias_return_thunk+0x5/0xfbef5? exc_page_fault+0x1b6/0x1c0? asm_exc_page_fault+0x26/0x30? smb2_parse_contexts+0xa0/0x3a0 [cifs] SMB2_open+0x38d/0x5f0 [cifs] ? smb2_is_path_accessible+0x138/0x260 [cifs] smb2_is_path_accessible+0x138/0x260 [cifs] cifs_is_path_remote+0x8d/0x230 [cifs] cifs_mount+0x7e/0x350 [cifs] cifs_smb3_do_mount+0x128/0x7 80 [cifs] smb3_get_tree+0xd9/0x290 [cifs] vfs_get_tree+ 0x2c/0x100? capaz+0x37/0x70 path_mount+0x2d7/0xb80? srso_alias_return_thunk+0x5/0xfbef5? _raw_spin_unlock_irqrestore+0x44/0x60 __x64_sys_mount+0x11a/0x150 do_syscall_64+0x47/0xf0 Entry_SYSCALL_64_after_hwframe+0x6f/0x77 RIP: 0033:0x7f8737657b1e"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.211",
"matchCriteriaId": "DC6905D6-5F33-4718-AAFD-C356351E82B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11.0",
"versionEndExcluding": "5.15.150",
"matchCriteriaId": "892B1C6C-0A61-4DAC-9F79-172AB564A179"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16.0",
"versionEndIncluding": "6.1.79",
"matchCriteriaId": "61F11EE9-C08A-482C-AE65-9D10AA4C8987"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.6.8",
"matchCriteriaId": "CD91B283-F216-4A2B-ACCB-AF90DA101D1D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/13fb0fc4917621f3dfa285a27eaf7151d770b5e5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/17a0f64cc02d4972e21c733d9f21d1c512963afa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1ae3c59355dc9882e09c020afe8ffbd895ad0f29",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/890bc4fac3c0973a49cac35f634579bebba7fe48",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/af1689a9b7701d9907dfc84d2a4b57c4bc907144",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52435",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-20T20:15:08.063",
"lastModified": "2024-02-23T09:15:22.190",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-15T14:06:17.587",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,31 +14,155 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: previene el desbordamiento de mss en skb_segment() Una vez m\u00e1s, syzbot puede bloquear el kernel en skb_segment() [1] GSO_BY_FRAGS es un valor prohibido, pero desafortunadamente el siguiente c\u00e1lculo en skb_segment () puede alcanzarlo con bastante facilidad: mss = mss * part_segs; 65535 = 3 * 5 * 17 * 257, por lo que muchos valores iniciales de mss pueden llevar a un mal resultado final. Aseg\u00farese de limitar la segmentaci\u00f3n para que el nuevo valor de mss sea menor que GSO_BY_FRAGS. [1] falla de protecci\u00f3n general, probablemente para direcci\u00f3n no can\u00f3nica 0xdffffc000000000e: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref en rango [0x0000000000000070-0x0000000000000077] CPU: 1 PID: 5079 Comm: syz-executor993 Not tainted 6.7.0-rc4-syzkaller-00141-g1ae4cd3cbdd0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 RIP: 0010:skb_segment+0x181d/0x3f30 net/core/skbuff.c:4551 Code: 83 e3 02 e9 fb ed ff ff e8 90 68 1c f9 48 8b 84 24 f8 00 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 8a 21 00 00 48 8b 84 24 f8 00 RSP: 0018:ffffc900043473d0 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000000000010046 RCX: ffffffff886b1597 RDX: 000000000000000e RSI: ffffffff886b2520 RDI: 0000000000000070 RBP: ffffc90004347578 R08: 0000000000000005 R09: 000000000000ffff R10: 000000000000ffff R11: 0000000000000002 R12: ffff888063202ac0 R13: 0000000000010000 R14: 000000000000ffff R15: 0000000000000046 FS: 0000555556e7e380(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020010000 CR3: 0000000027ee2000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: udp6_ufo_fragment+0xa0e/0xd00 net/ipv6/udp_offload.c:109 ipv6_gso_segment+0x534/0x17e0 net/ipv6/ip6_offload.c:120 skb_mac_gso_segment+0x290/0x610 net/core/gso.c:53 __skb_gso_segment+0x339/0x710 net/core/gso.c:124 skb_gso_segment include/net/gso.h:83 [inline] validate_xmit_skb+0x36c/0xeb0 net/core/dev.c:3626 __dev_queue_xmit+0x6f3/0x3d60 net/core/dev.c:4338 dev_queue_xmit include/linux/netdevice.h:3134 [inline] packet_xmit+0x257/0x380 net/packet/af_packet.c:276 packet_snd net/packet/af_packet.c:3087 [inline] packet_sendmsg+0x24c6/0x5220 net/packet/af_packet.c:3119 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0xd5/0x180 net/socket.c:745 __sys_sendto+0x255/0x340 net/socket.c:2190 __do_sys_sendto net/socket.c:2202 [inline] __se_sys_sendto net/socket.c:2198 [inline] __x64_sys_sendto+0xe0/0x1b0 net/socket.c:2198 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x63/0x6b RIP: 0033:0x7f8692032aa9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 d1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fff8d685418 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f8692032aa9 RDX: 0000000000010048 RSI: 00000000200000c0 RDI: 0000000000000003 RBP: 00000000000f4240 R08: 0000000020000540 R09: 0000000000000014 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff8d685480 R13: 0000000000000001 R14: 00007fff8d685480 R15: 0000000000000003 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:skb_segment+0x181d/0x3f30 net/core/skbuff.c:4551 Code: 83 e3 02 e9 fb ed ff ff e8 90 68 1c f9 48 8b 84 24 f8 00 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 8a 21 00 00 48 8b 84 24 f8 00 RSP: 0018:ffffc900043473d0 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000000000010046 RCX: ffffffff886b1597 RDX: 000000000000000e RSI: ffffffff886b2520 RDI: 0000000000000070 RBP: ffffc90004347578 R0 ---truncated--- "
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.269",
"matchCriteriaId": "48E561A5-2F59-4E74-BFAB-39B8D844FD15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5.0",
"versionEndExcluding": "5.10.210",
"matchCriteriaId": "B39742A2-A0C1-490C-95CC-FB78D6D70698"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11.0",
"versionEndExcluding": "5.15.149",
"matchCriteriaId": "E6FB1C44-BEEE-4D31-AD44-E15806EA6249"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16.0",
"versionEndExcluding": "6.1.79",
"matchCriteriaId": "3B0A907E-1010-4294-AEFE-0EB5684AF52C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.6.11",
"matchCriteriaId": "B476EA8E-7141-4ABB-8EF7-F7B6806D4892"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:*",
"matchCriteriaId": "3A0038DE-E183-4958-A6E3-CE3821FEAFBF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E31AD4FC-436C-44AB-BCAB-3A0B37F69EE0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc3:*:*:*:*:*:*",
"matchCriteriaId": "C56C6E04-4F04-44A3-8DB8-93899903CFCF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc4:*:*:*:*:*:*",
"matchCriteriaId": "5C78EDA4-8BE6-42FC-9512-49032D525A55"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc5:*:*:*:*:*:*",
"matchCriteriaId": "32F2E5CA-13C6-4601-B530-D465CBF73D1C"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/23d05d563b7e7b0314e65c8e882bc27eac2da8e7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6c53e8547687d9c767c139cd4b50af566f58c29a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8f8f185643747fbb448de6aab0efa51c679909a3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/95b3904a261a9f810205da560e802cc326f50d77",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/989b0ff35fe5fc9652ee5bafbe8483db6f27b137",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cd1022eaf87be8e6151435bd4df4c242c347e083",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,43 +2,157 @@
"id": "CVE-2023-52438",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-20T21:15:08.167",
"lastModified": "2024-02-20T21:52:55.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-15T14:03:51.503",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: fix use-after-free in shinker's callback\n\nThe mmap read lock is used during the shrinker's callback, which means\nthat using alloc->vma pointer isn't safe as it can race with munmap().\nAs of commit dd2283f2605e (\"mm: mmap: zap pages with read mmap_sem in\nmunmap\") the mmap lock is downgraded after the vma has been isolated.\n\nI was able to reproduce this issue by manually adding some delays and\ntriggering page reclaiming through the shrinker's debug sysfs. The\nfollowing KASAN report confirms the UAF:\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in zap_page_range_single+0x470/0x4b8\n Read of size 8 at addr ffff356ed50e50f0 by task bash/478\n\n CPU: 1 PID: 478 Comm: bash Not tainted 6.6.0-rc5-00055-g1c8b86a3799f-dirty #70\n Hardware name: linux,dummy-virt (DT)\n Call trace:\n zap_page_range_single+0x470/0x4b8\n binder_alloc_free_page+0x608/0xadc\n __list_lru_walk_one+0x130/0x3b0\n list_lru_walk_node+0xc4/0x22c\n binder_shrink_scan+0x108/0x1dc\n shrinker_debugfs_scan_write+0x2b4/0x500\n full_proxy_write+0xd4/0x140\n vfs_write+0x1ac/0x758\n ksys_write+0xf0/0x1dc\n __arm64_sys_write+0x6c/0x9c\n\n Allocated by task 492:\n kmem_cache_alloc+0x130/0x368\n vm_area_alloc+0x2c/0x190\n mmap_region+0x258/0x18bc\n do_mmap+0x694/0xa60\n vm_mmap_pgoff+0x170/0x29c\n ksys_mmap_pgoff+0x290/0x3a0\n __arm64_sys_mmap+0xcc/0x144\n\n Freed by task 491:\n kmem_cache_free+0x17c/0x3c8\n vm_area_free_rcu_cb+0x74/0x98\n rcu_core+0xa38/0x26d4\n rcu_core_si+0x10/0x1c\n __do_softirq+0x2fc/0xd24\n\n Last potentially related work creation:\n __call_rcu_common.constprop.0+0x6c/0xba0\n call_rcu+0x10/0x1c\n vm_area_free+0x18/0x24\n remove_vma+0xe4/0x118\n do_vmi_align_munmap.isra.0+0x718/0xb5c\n do_vmi_munmap+0xdc/0x1fc\n __vm_munmap+0x10c/0x278\n __arm64_sys_munmap+0x58/0x7c\n\nFix this issue by performing instead a vma_lookup() which will fail to\nfind the vma that was isolated before the mmap lock downgrade. Note that\nthis option has better performance than upgrading to a mmap write lock\nwhich would increase contention. Plus, mmap_write_trylock() has been\nrecently removed anyway."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: binder: corrige el use-after-free en la devoluci\u00f3n de llamada de shinker. El bloqueo de lectura mmap se usa durante la devoluci\u00f3n de llamada de shrinker, lo que significa que usar el puntero alloc->vma no es seguro ya que puede ejecutarse con munmap(). A partir de el commit dd2283f2605e (\"mm: mmap: zap p\u00e1ginas con lectura mmap_sem en munmap\"), el bloqueo mmap se degrada despu\u00e9s de que se ha aislado el vma. Pude reproducir este problema agregando manualmente algunos retrasos y activando la recuperaci\u00f3n de p\u00e1ginas a trav\u00e9s del sistema de depuraci\u00f3n del reductor. El siguiente informe de KASAN confirma la UAF: =========================================== ======================== ERROR: KASAN: slab-use-after-free en zap_page_range_single+0x470/0x4b8 Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff356ed50e50f0 por tarea bash/478 CPU: 1 PID: 478 Comm: bash No contaminado 6.6.0-rc5-00055-g1c8b86a3799f-dirty #70 Nombre de hardware: linux,dummy-virt (DT) Rastreo de llamadas: zap_page_range_single+0x470/0x4b8 binder_alloc_free_page+0x608/ 0xadc __list_lru_walk_one+0x130/0x3b0 list_lru_walk_node+0xc4/0x22c binder_shrink_scan+0x108/0x1dc encogimiento_debugfs_scan_write+0x2b4/0x500 full_proxy_write+0xd4/0x140 vfs_write+0x1ac/0x758 ksys_write+0xf0/0x1dc __arm64_sys_write+0x6c/0x9c Asignado por la tarea 492: kmem_cache_alloc+0x130/ 0x368 vm_area_alloc+0x2c/0x190 mmap_region+0x258/0x18bc do_mmap+0x694/0xa60 vm_mmap_pgoff+0x170/0x29c ksys_mmap_pgoff+0x290/0x3a0 __arm64_sys_mmap+0xcc/0x144 Liberado por tarea 491: kmem_cache_free+0x17c/0x3c8 vm_area_free_rcu_cb+0x74/0x98 rcu_core+0xa38/ 0x26d4 rcu_core_si+0x10/0x1c __do_softirq+0x2fc/0xd24 \u00daltima creaci\u00f3n de trabajo potencialmente relacionado: __call_rcu_common.constprop.0+0x6c/0xba0 call_rcu+0x10/0x1c vm_area_free+0x18/0x24 remove_vma+0xe4/0x118 do_vmi _align_munmap.isra.0+0x718/0xb5c do_vmi_munmap+0xdc/0x1fc __vm_munmap+0x10c/0x278 __arm64_sys_munmap+0x58/0x7c Solucione este problema realizando en su lugar un vma_lookup() que no podr\u00e1 encontrar el vma que estaba aislado antes de la degradaci\u00f3n del bloqueo mmap. Tenga en cuenta que esta opci\u00f3n tiene un mejor rendimiento que actualizar a un bloqueo de escritura mmap, lo que aumentar\u00eda la contenci\u00f3n. Adem\u00e1s, mmap_write_trylock() se elimin\u00f3 recientemente de todos modos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20.0",
"versionEndExcluding": "5.4.268",
"matchCriteriaId": "35ADF607-EDCA-45AB-8FB6-9F2D40D47C0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5.0",
"versionEndExcluding": "5.10.209",
"matchCriteriaId": "5D2E4F24-2FBB-4434-8598-2B1499E566B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11.0",
"versionEndExcluding": "5.15.148",
"matchCriteriaId": "E25E1389-4B0F-407A-9C94-5908FF3EE88B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16.0",
"versionEndExcluding": "6.1.74",
"matchCriteriaId": "F7DD9841-CE11-470D-A285-A2E8E0F6640D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.6.13",
"matchCriteriaId": "74A1FFC7-19FA-450E-BC2D-2BBD2EBF0A5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndExcluding": "6.7.1",
"matchCriteriaId": "664EB721-F519-48BB-B1C8-897D5990CD78"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/3f489c2067c5824528212b0fc18b28d51332d906",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8ad4d580e8aff8de2a4d57c5930fcc29f1ffd4a6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9fa04c93f24138747807fe75b5591bb680098f56",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a49087ab93508b60d9b8add91707a22dda832869",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a53e15e592b4dcc91c3a3b8514e484a0bdbc53a3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c8c1158ffb007197f31f9d9170cf13e4f34cbb5c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e074686e993ff1be5f21b085a3b1b4275ccd5727",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,47 +2,196 @@
"id": "CVE-2023-52439",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-20T21:15:08.213",
"lastModified": "2024-02-20T21:52:55.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-15T14:21:10.847",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio: Fix use-after-free in uio_open\n\ncore-1\t\t\t\tcore-2\n-------------------------------------------------------\nuio_unregister_device\t\tuio_open\n\t\t\t\tidev = idr_find()\ndevice_unregister(&idev->dev)\nput_device(&idev->dev)\nuio_device_release\n\t\t\t\tget_device(&idev->dev)\nkfree(idev)\nuio_free_minor(minor)\n\t\t\t\tuio_release\n\t\t\t\tput_device(&idev->dev)\n\t\t\t\tkfree(idev)\n-------------------------------------------------------\n\nIn the core-1 uio_unregister_device(), the device_unregister will kfree\nidev when the idev->dev kobject ref is 1. But after core-1\ndevice_unregister, put_device and before doing kfree, the core-2 may\nget_device. Then:\n1. After core-1 kfree idev, the core-2 will do use-after-free for idev.\n2. When core-2 do uio_release and put_device, the idev will be double\n freed.\n\nTo address this issue, we can get idev atomic & inc idev reference with\nminor_lock."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: uio: corrige use-after-free en uio_open core-1 core-2 ------------------------------------------------------- uio_unregister_device uio_open idev = idr_find() device_unregister(&idev->dev) put_device(&idev->dev) uio_device_release get_device(&idev->dev) kfree(idev) uio_free_minor(minor) uio_release put_device(&idev->dev) kfree(idev) ------------------------------------------------------- In the core-1 uio_unregister_device(), the device_unregister se liberar\u00e1 idev cuando la referencia del objeto idev->dev kobject es 1. But after core-1 device_unregister, put_device and before doing kfree, the core-2 may get_device. Then: 1. After core-1 kfree idev, the core-2 will do use-after-free for idev. 2. When core-2 do uio_release and put_device, el idev se liberar\u00e1 dos veces. Para solucionar este problema, podemos obtener la referencia de idev atomic & inc idev con minor_lock."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "4.18.0",
"versionEndExcluding": "4.19.306",
"matchCriteriaId": "5A94A44F-4F9A-4447-AF13-47B88B4CD211"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20.0",
"versionEndExcluding": "5.4.268",
"matchCriteriaId": "35ADF607-EDCA-45AB-8FB6-9F2D40D47C0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5.0",
"versionEndExcluding": "5.10.209",
"matchCriteriaId": "5D2E4F24-2FBB-4434-8598-2B1499E566B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11.0",
"versionEndExcluding": "5.15.148",
"matchCriteriaId": "E25E1389-4B0F-407A-9C94-5908FF3EE88B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16.0",
"versionEndExcluding": "6.1.74",
"matchCriteriaId": "F7DD9841-CE11-470D-A285-A2E8E0F6640D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.6.13",
"matchCriteriaId": "74A1FFC7-19FA-450E-BC2D-2BBD2EBF0A5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndExcluding": "6.7.1",
"matchCriteriaId": "664EB721-F519-48BB-B1C8-897D5990CD78"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:4.18:-:*:*:*:*:*:*",
"matchCriteriaId": "6AE7DC47-EAFA-42D5-BCF5-C7039EE3D771"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:4.18:rc5:*:*:*:*:*:*",
"matchCriteriaId": "DB2B91AF-ACE1-4F6F-B2D0-9D4B7D8D20CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:4.18:rc6:*:*:*:*:*:*",
"matchCriteriaId": "30FBD992-DD41-441E-A6C7-D39DAC45DA34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:4.18:rc7:*:*:*:*:*:*",
"matchCriteriaId": "10979D17-76B4-465F-A475-78680FBECEBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:4.18:rc8:*:*:*:*:*:*",
"matchCriteriaId": "56BF1EDD-3351-4E3E-AD42-54AF093ADB89"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0c9ae0b8605078eafc3bea053cc78791e97ba2e2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/17a8519cb359c3b483fb5c7367efa9a8a508bdea",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3174e0f7de1ba392dc191625da83df02d695b60c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/35f102607054faafe78d2a6994b18d5d9d6e92ad",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5cf604ee538ed0c467abe3b4cda5308a6398f0f7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5e0be1229ae199ebb90b33102f74a0f22d152570",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/913205930da6213305616ac539447702eaa85e41",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e93da893d52d82d57fc0db2ca566024e0f26ff50",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52440",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-21T08:15:45.203",
"lastModified": "2024-02-22T19:07:27.197",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-15T13:44:59.367",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,27 +14,110 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ksmbd: corrige el desbordamiento de slub en ksmbd_decode_ntlmssp_auth_blob() Si authblob->SessionKey.Length es mayor que el tama\u00f1o de la clave de sesi\u00f3n (CIFS_KEY_SIZE), puede ocurrir un desbordamiento de slub en los c\u00f3digos de intercambio de claves. cifs_arc4_crypt copia a la matriz de claves de sesi\u00f3n desde SessionKey del cliente."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.17.0",
"versionEndExcluding": "6.1.52",
"matchCriteriaId": "169F25B6-7A66-437D-B095-420A0C9D2628"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.4.15",
"matchCriteriaId": "FB08B8F4-BEEF-473F-8A44-8C0DC24B919C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.5.0",
"versionEndExcluding": "6.5.2",
"matchCriteriaId": "496F2478-0324-4792-B3ED-95D8884323A4"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/30fd6521b2fbd9b767e438e31945e5ea3e3a2fba",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4b081ce0d830b684fdf967abc3696d1261387254",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7f1d6cb0eb6af3a8088dc24b7ddee9a9711538c4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bd554ed4fdc3d38404a1c43d428432577573e809",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ecd7e1c562cb08e41957fcd4b0e404de5ab38e20",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52441",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-21T08:15:45.463",
"lastModified": "2024-02-22T19:07:27.197",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-15T13:56:31.710",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,23 +14,103 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ksmbd: correcci\u00f3n fuera de los l\u00edmites en init_smb2_rsp_hdr() Si el cliente env\u00eda una solicitud de negociaci\u00f3n smb2 y luego env\u00eda una solicitud de negociaci\u00f3n smb1, se llama a init_smb2_rsp_hdr para la solicitud de negociaci\u00f3n smb1 ya que need_neg est\u00e1 configurado en falso. Este parche ignora los paquetes smb1 despu\u00e9s de que ->need_neg se establece en falso."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15.0",
"versionEndExcluding": "5.15.145",
"matchCriteriaId": "9FF1671D-E1DC-4CBC-8438-A46DF4F1E978"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16.0",
"versionEndExcluding": "6.1.53",
"matchCriteriaId": "10E7E9D1-2299-4B6E-945D-98FF23478015"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.4.16",
"matchCriteriaId": "447B7633-4054-4954-8C80-6F6098C5574B"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/330d900620dfc9893011d725b3620cd2ee0bc2bc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/536bb492d39bb6c080c92f31e8a55fe9934f452b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5c0df9d30c289d6b9d7d44e2a450de2f8e3cf40b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/aa669ef229ae8dd779da9caa24e254964545895f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-6725",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-03-15T13:15:06.857",
"lastModified": "2024-03-15T13:15:06.857",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An access-control flaw was found in the OpenStack Designate component where private configuration information including access keys to BIND were improperly made world readable. A malicious attacker with access to any container could exploit this flaw to access sensitive information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1220"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-6725",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2249273",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-23112",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-03-12T15:15:49.090",
"lastModified": "2024-03-12T16:02:33.900",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-15T14:51:58.497",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.1 through 7.0.13, 6.4.7 through 6.4.14, and FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 SSL-VPN may allow an authenticated attacker to gain access to another user\u2019s bookmark via URL manipulation."
},
{
"lang": "es",
"value": "Una omisi\u00f3n de autorizaci\u00f3n a trav\u00e9s de una vulnerabilidad de clave controlada por el usuario [CWE-639] en FortiOS versi\u00f3n 7.4.0 a 7.4.1, 7.2.0 a 7.2.6, 7.0.1 a 7.0.13, 6.4.7 a 6.4.14, y FortiProxy versi\u00f3n 7.4.0 a 7.4.2, 7.2.0 a 7.2.8, 7.0.0 a 7.0.14 SSL-VPN puede permitir que un atacante autenticado obtenga acceso al marcador de otro usuario mediante manipulaci\u00f3n de URL."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -46,10 +70,74 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.14",
"matchCriteriaId": "94C6FBEA-B8B8-4A92-9CAF-F4A125577C3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndIncluding": "7.2.8",
"matchCriteriaId": "406F8C48-85CE-46AF-BE5C-0ED9E3E16A39"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndIncluding": "7.4.2",
"matchCriteriaId": "A8DD8789-6485-49E6-92D3-74004D9B6E9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.7",
"versionEndIncluding": "6.4.14",
"matchCriteriaId": "4841D40B-DA6E-4B4A-A698-8E23B3E40101"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.1",
"versionEndIncluding": "7.0.13",
"matchCriteriaId": "40193C91-DAF4-4A0D-9AA7-0D4DDE964488"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndIncluding": "7.2.6",
"matchCriteriaId": "24D09A92-81EC-4003-B017-C67FC739EEBF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndIncluding": "7.4.1",
"matchCriteriaId": "2E2A5347-D536-4D43-A163-5B5A3AFE742C"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-24-013",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2495",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-15T13:15:09.500",
"lastModified": "2024-03-15T13:15:09.500",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cryptographic key vulnerability encoded in the FriendlyWrt firmware affecting version 2022-11-16.51b3d35. This vulnerability could allow an attacker to compromise the confidentiality and integrity of encrypted data."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.0,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1321"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/cryptographic-key-plain-text-vulnerability-friendlyelecs-friendlywrt",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-25592",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-15T14:15:07.550",
"lastModified": "2024-03-15T14:15:07.550",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPMU DEV Broken Link Checker allows Stored XSS.This issue affects Broken Link Checker: from n/a through 2.2.3.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/broken-link-checker/wordpress-broken-link-checker-plugin-2-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-25593",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-15T14:15:07.787",
"lastModified": "2024-03-15T14:15:07.787",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Basix NEX-Forms \u2013 Ultimate Form Builder allows Stored XSS.This issue affects NEX-Forms \u2013 Ultimate Form Builder: from n/a through 8.5.5.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/nex-forms-express-wp-form-builder/wordpress-nex-forms-plugin-8-5-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-25596",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-15T14:15:07.990",
"lastModified": "2024-03-15T14:15:07.990",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Doofinder Doofinder for WooCommerce allows Stored XSS.This issue affects Doofinder for WooCommerce: from n/a through 2.1.8.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/doofinder-for-woocommerce/wordpress-doofinder-for-woocommerce-plugin-2-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-25597",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-15T14:15:08.220",
"lastModified": "2024-03-15T14:15:08.220",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Etoile Web Design Ultimate Reviews allows Stored XSS.This issue affects Ultimate Reviews: from n/a through 3.2.8.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ultimate-reviews/wordpress-ultimate-reviews-plugin-3-2-8-unauthenticated-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-25598",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-15T13:15:07.087",
"lastModified": "2024-03-15T13:15:07.087",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Livemesh Livemesh Addons for Elementor allows Stored XSS.This issue affects Livemesh Addons for Elementor: from n/a through 8.3.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/addons-for-elementor/wordpress-elementor-addons-by-livemesh-plugin-8-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-25916",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-15T13:15:07.323",
"lastModified": "2024-03-15T13:15:07.323",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joseph C Dolson My Calendar allows Stored XSS.This issue affects My Calendar: from n/a through 3.4.23.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/my-calendar/wordpress-my-calendar-plugin-3-4-23-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-25919",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-15T13:15:07.563",
"lastModified": "2024-03-15T13:15:07.563",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hiroaki Miyashita Custom Field Template allows Stored XSS.This issue affects Custom Field Template: from n/a through 2.6.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/custom-field-template/wordpress-custom-field-template-plugin-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-25921",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-15T13:15:07.807",
"lastModified": "2024-03-15T13:15:07.807",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Concerted Action Action Network allows Reflected XSS.This issue affects Action Network: from n/a through 1.4.2.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-action-network/wordpress-action-network-plugin-1-4-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-25934",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-15T13:15:08.070",
"lastModified": "2024-03-15T13:15:08.070",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FormFacade allows Stored XSS.This issue affects FormFacade: from n/a through 1.0.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/formfacade/wordpress-formfacade-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-25936",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-15T13:15:08.287",
"lastModified": "2024-03-15T13:15:08.287",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SoundCloud Inc., Lawrie Malen SoundCloud Shortcode allows Stored XSS.This issue affects SoundCloud Shortcode: from n/a through 4.0.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/soundcloud-shortcode/wordpress-soundcloud-shortcode-plugin-4-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26582",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-21T15:15:09.327",
"lastModified": "2024-03-11T18:15:18.377",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-15T13:56:41.843",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,23 +14,103 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: tls: corrige el use-after-free con lecturas parciales y descifrado as\u00edncrono tls_decrypt_sg no toma una referencia en las p\u00e1ginas de clear_skb, por lo que put_page() en tls_decrypt_done las libera y activamos un use-after-free en Process_rx_list cuando intentamos leer desde el skb parcialmente le\u00eddo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0",
"versionEndExcluding": "6.1.79",
"matchCriteriaId": "82C70944-013B-4FC2-97B8-F2D6C1342B5E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.6.18",
"matchCriteriaId": "A5CC150E-F35C-4CF7-ADF5-422D32C511C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndExcluding": "6.7.6",
"matchCriteriaId": "0C8D1FAD-4D5D-4A25-B058-2AD15082710E"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/20b4ed034872b4d024b26e2bc1092c3f80e5db96",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/32b55c5ff9103b8508c1e04bfa5a08c64e7a925f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/754c9bab77a1b895b97bd99d754403c505bc79df",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d684763534b969cca1022e2a28645c7cc91f7fa5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26583",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-21T15:15:09.373",
"lastModified": "2024-03-11T18:15:18.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-15T13:05:03.220",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,23 +14,103 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: tls: corrige la ejecuci\u00f3n entre la notificaci\u00f3n as\u00edncrona y el cierre del socket. El hilo de env\u00edo (uno que llam\u00f3 recvmsg/sendmsg) puede salir tan pronto como el controlador criptogr\u00e1fico as\u00edncrono llame a complete(), por lo que cualquier c\u00f3digo pasado ese punto corre el riesgo de tocar datos ya liberados. Intente evitar por completo el bloqueo y las banderas adicionales. Haga que el hilo principal contenga una referencia adicional, de esta manera podemos depender \u00fanicamente del contador de referencia at\u00f3mica para la sincronizaci\u00f3n. Tampoco te preocupes por reiniciar la finalizaci\u00f3n, ahora estamos controlando estrictamente cu\u00e1ndo se activa la finalizaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.7.0",
"versionEndExcluding": "6.1.79",
"matchCriteriaId": "37AE2B04-CF69-412C-89AE-605725C54364"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.6.18",
"matchCriteriaId": "A5CC150E-F35C-4CF7-ADF5-422D32C511C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndExcluding": "6.7.6",
"matchCriteriaId": "0C8D1FAD-4D5D-4A25-B058-2AD15082710E"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/6209319b2efdd8524691187ee99c40637558fa33",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7a3ca06d04d589deec81f56229a9a9d62352ce01",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/86dc27ee36f558fe223dbdfbfcb6856247356f4a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/aec7961916f3f9e88766e2688992da6980f11b8d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-27189",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-15T13:15:08.500",
"lastModified": "2024-03-15T13:15:08.500",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in catchsquare WP Social Widget allows Stored XSS.This issue affects WP Social Widget: from n/a through 2.2.5.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-social-widget/wordpress-wp-social-widget-plugin-2-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-27192",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-15T13:15:08.737",
"lastModified": "2024-03-15T13:15:08.737",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scott Reilly Configure SMTP allows Reflected XSS.This issue affects Configure SMTP: from n/a through 3.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/configure-smtp/wordpress-configure-smtp-plugin-3-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-27193",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-15T13:15:09.043",
"lastModified": "2024-03-15T13:15:09.043",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PayU PayU India allows Reflected XSS.This issue affects PayU India: from n/a through 3.8.2.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/payu-india/wordpress-payu-india-plugin-3-8-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-27196",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-15T13:15:09.277",
"lastModified": "2024-03-15T13:15:09.277",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting (XSS) vulnerability in Joel Starnes postMash \u2013 custom post order allows Reflected XSS.This issue affects postMash \u2013 custom post order: from n/a through 1.2.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/postmash/wordpress-postmash-custom-post-order-plugin-1-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-15T13:00:30.346703+00:00
2024-03-15T15:00:38.131917+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-15T12:53:06.423000+00:00
2024-03-15T14:52:23.887000+00:00
```
### Last Data Feed Release
@ -29,47 +29,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
241573
241591
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `18`
* [CVE-2024-23944](CVE-2024/CVE-2024-239xx/CVE-2024-23944.json) (`2024-03-15T11:15:08.927`)
* [CVE-2024-27987](CVE-2024/CVE-2024-279xx/CVE-2024-27987.json) (`2024-03-15T11:15:09.013`)
* [CVE-2024-28752](CVE-2024/CVE-2024-287xx/CVE-2024-28752.json) (`2024-03-15T11:15:09.220`)
* [CVE-2023-50861](CVE-2023/CVE-2023-508xx/CVE-2023-50861.json) (`2024-03-15T14:15:07.207`)
* [CVE-2023-51525](CVE-2023/CVE-2023-515xx/CVE-2023-51525.json) (`2024-03-15T14:15:07.457`)
* [CVE-2023-6725](CVE-2023/CVE-2023-67xx/CVE-2023-6725.json) (`2024-03-15T13:15:06.857`)
* [CVE-2024-2495](CVE-2024/CVE-2024-24xx/CVE-2024-2495.json) (`2024-03-15T13:15:09.500`)
* [CVE-2024-25592](CVE-2024/CVE-2024-255xx/CVE-2024-25592.json) (`2024-03-15T14:15:07.550`)
* [CVE-2024-25593](CVE-2024/CVE-2024-255xx/CVE-2024-25593.json) (`2024-03-15T14:15:07.787`)
* [CVE-2024-25596](CVE-2024/CVE-2024-255xx/CVE-2024-25596.json) (`2024-03-15T14:15:07.990`)
* [CVE-2024-25597](CVE-2024/CVE-2024-255xx/CVE-2024-25597.json) (`2024-03-15T14:15:08.220`)
* [CVE-2024-25598](CVE-2024/CVE-2024-255xx/CVE-2024-25598.json) (`2024-03-15T13:15:07.087`)
* [CVE-2024-25916](CVE-2024/CVE-2024-259xx/CVE-2024-25916.json) (`2024-03-15T13:15:07.323`)
* [CVE-2024-25919](CVE-2024/CVE-2024-259xx/CVE-2024-25919.json) (`2024-03-15T13:15:07.563`)
* [CVE-2024-25921](CVE-2024/CVE-2024-259xx/CVE-2024-25921.json) (`2024-03-15T13:15:07.807`)
* [CVE-2024-25934](CVE-2024/CVE-2024-259xx/CVE-2024-25934.json) (`2024-03-15T13:15:08.070`)
* [CVE-2024-25936](CVE-2024/CVE-2024-259xx/CVE-2024-25936.json) (`2024-03-15T13:15:08.287`)
* [CVE-2024-27189](CVE-2024/CVE-2024-271xx/CVE-2024-27189.json) (`2024-03-15T13:15:08.500`)
* [CVE-2024-27192](CVE-2024/CVE-2024-271xx/CVE-2024-27192.json) (`2024-03-15T13:15:08.737`)
* [CVE-2024-27193](CVE-2024/CVE-2024-271xx/CVE-2024-27193.json) (`2024-03-15T13:15:09.043`)
* [CVE-2024-27196](CVE-2024/CVE-2024-271xx/CVE-2024-27196.json) (`2024-03-15T13:15:09.277`)
### CVEs modified in the last Commit
Recently modified CVEs: `58`
Recently modified CVEs: `10`
* [CVE-2024-2450](CVE-2024/CVE-2024-24xx/CVE-2024-2450.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-2478](CVE-2024/CVE-2024-24xx/CVE-2024-2478.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-2479](CVE-2024/CVE-2024-24xx/CVE-2024-2479.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-2480](CVE-2024/CVE-2024-24xx/CVE-2024-2480.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-2481](CVE-2024/CVE-2024-24xx/CVE-2024-2481.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-2482](CVE-2024/CVE-2024-24xx/CVE-2024-2482.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-2483](CVE-2024/CVE-2024-24xx/CVE-2024-2483.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-2485](CVE-2024/CVE-2024-24xx/CVE-2024-2485.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-2486](CVE-2024/CVE-2024-24xx/CVE-2024-2486.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-2487](CVE-2024/CVE-2024-24xx/CVE-2024-2487.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-2488](CVE-2024/CVE-2024-24xx/CVE-2024-2488.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-2489](CVE-2024/CVE-2024-24xx/CVE-2024-2489.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-2490](CVE-2024/CVE-2024-24xx/CVE-2024-2490.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-24975](CVE-2024/CVE-2024-249xx/CVE-2024-24975.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-25227](CVE-2024/CVE-2024-252xx/CVE-2024-25227.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-26163](CVE-2024/CVE-2024-261xx/CVE-2024-26163.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-26246](CVE-2024/CVE-2024-262xx/CVE-2024-26246.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-26454](CVE-2024/CVE-2024-264xx/CVE-2024-26454.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-26475](CVE-2024/CVE-2024-264xx/CVE-2024-26475.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-26503](CVE-2024/CVE-2024-265xx/CVE-2024-26503.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-26540](CVE-2024/CVE-2024-265xx/CVE-2024-26540.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-27756](CVE-2024/CVE-2024-277xx/CVE-2024-27756.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-28053](CVE-2024/CVE-2024-280xx/CVE-2024-28053.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-28353](CVE-2024/CVE-2024-283xx/CVE-2024-28353.json) (`2024-03-15T12:53:06.423`)
* [CVE-2024-28354](CVE-2024/CVE-2024-283xx/CVE-2024-28354.json) (`2024-03-15T12:53:06.423`)
* [CVE-2023-48788](CVE-2023/CVE-2023-487xx/CVE-2023-48788.json) (`2024-03-15T14:52:23.887`)
* [CVE-2023-52434](CVE-2023/CVE-2023-524xx/CVE-2023-52434.json) (`2024-03-15T14:21:29.950`)
* [CVE-2023-52435](CVE-2023/CVE-2023-524xx/CVE-2023-52435.json) (`2024-03-15T14:06:17.587`)
* [CVE-2023-52438](CVE-2023/CVE-2023-524xx/CVE-2023-52438.json) (`2024-03-15T14:03:51.503`)
* [CVE-2023-52439](CVE-2023/CVE-2023-524xx/CVE-2023-52439.json) (`2024-03-15T14:21:10.847`)
* [CVE-2023-52440](CVE-2023/CVE-2023-524xx/CVE-2023-52440.json) (`2024-03-15T13:44:59.367`)
* [CVE-2023-52441](CVE-2023/CVE-2023-524xx/CVE-2023-52441.json) (`2024-03-15T13:56:31.710`)
* [CVE-2024-23112](CVE-2024/CVE-2024-231xx/CVE-2024-23112.json) (`2024-03-15T14:51:58.497`)
* [CVE-2024-26582](CVE-2024/CVE-2024-265xx/CVE-2024-26582.json) (`2024-03-15T13:56:41.843`)
* [CVE-2024-26583](CVE-2024/CVE-2024-265xx/CVE-2024-26583.json) (`2024-03-15T13:05:03.220`)
## Download and Usage

View File

@ -193424,7 +193424,7 @@ CVE-2022-25138,0,0,095bc1b88099ec319919372adc5664376d881c7122c4259d76a7668aeeff8
CVE-2022-25139,0,0,b263a8c92c8d08ff7b15d380126b7013a9452619a61e6968e63adfd4afaf98c5,2022-03-24T14:35:03.850000
CVE-2022-2514,0,0,5180332558d8b16b1319494be300ca9ad259fc298d544c7d3ce0324395f5fba0,2022-07-27T19:29:52.413000
CVE-2022-25146,0,0,5a57e47d84d31101f62e70c86e21ab8e9e5c7700a09f8bc79a68b42c0f6b3ecb,2022-10-28T19:23:31.853000
CVE-2022-25147,0,1,37a7fee32f08f03e8104e41a463aad7323fa33fb4d08f45739bd0dc8a3446f4a,2024-03-15T11:15:07.027000
CVE-2022-25147,0,0,37a7fee32f08f03e8104e41a463aad7323fa33fb4d08f45739bd0dc8a3446f4a,2024-03-15T11:15:07.027000
CVE-2022-25148,0,0,cdfd3f26cb58162240c7de7ce58a5377d52abd74a58d49019151ac4f12891b42,2024-01-25T21:32:03.557000
CVE-2022-25149,0,0,9317b163352608980cc59d078d0fb81c53a7e1117e7f02ab5d3245ad8057c48b,2022-03-03T18:12:41.587000
CVE-2022-2515,0,0,5a8490c6ada289168ba9fe99d4d3c7f122251463184ad1aee1119a5def6b2d6c,2023-11-07T03:46:37.960000
@ -194040,7 +194040,7 @@ CVE-2022-25853,0,0,208a7b3980399fa4094fe050dddcf257e8603532748802e6dc98e0ae86ba6
CVE-2022-25854,0,0,cbf4f95e7d14dc4c46bdc02121ec74a89cb60535c191145d6baf6e041201309a,2022-09-23T18:57:11.480000
CVE-2022-25855,0,0,7ab85a87e7e74396d8d90916e476f789ecea2b9f4e4059578f6af12989d3e16a,2023-11-07T03:44:51.277000
CVE-2022-25856,0,0,3771afe6961f9597f1a7b100f9947a53671c4e5243e300d8b4978e5cfb9c26bc,2022-06-28T14:54:56.283000
CVE-2022-25857,0,1,9de37fa5a541e6e6e55304f8c732e3976dc46c326424d33bff1dc7faed3d8df8,2024-03-15T11:15:07.750000
CVE-2022-25857,0,0,9de37fa5a541e6e6e55304f8c732e3976dc46c326424d33bff1dc7faed3d8df8,2024-03-15T11:15:07.750000
CVE-2022-25858,0,0,e513ec495c2885cccac86c3c164dec042c24fbd954604811be6c86a569fa33ad,2022-07-21T14:33:45.663000
CVE-2022-2586,0,0,20643e91afc20570c916bb6f4219909d0ce99bb9aa7d8e4034056546f7bc44e8,2024-01-12T16:21:26.710000
CVE-2022-25860,0,0,f95205c836f0c654486cd82f6a59345ab861e05f2269db5bdef025fda33fb2e0,2023-11-07T03:44:51.413000
@ -204291,11 +204291,11 @@ CVE-2022-38742,0,0,35a65c8d1dad8fee06ef43506be96fe957d8f022cf02eebe83ed8bca36941
CVE-2022-38743,0,0,2b3f1cb4913f54fb4f1734f9b1cecfdcc7668d1a1e29c40311007e3646f0f98c,2022-10-19T17:55:40.100000
CVE-2022-38744,0,0,930278ed8aec9c8470d6a50af20fe0abc9761f5c22917a3dc8e9158cbe7234bf,2023-11-07T03:50:14.327000
CVE-2022-38745,0,0,76b03db448f954cd3252476a6a19ca909659b0fcb6b8c5bbd4591c25cb38b76c,2023-11-07T03:50:14.410000
CVE-2022-38749,0,1,b0acced012b896b3af94ffdb898686186d5eb22196d894cdaa6e6b2c65462934,2024-03-15T11:15:07.890000
CVE-2022-38749,0,0,b0acced012b896b3af94ffdb898686186d5eb22196d894cdaa6e6b2c65462934,2024-03-15T11:15:07.890000
CVE-2022-3875,0,0,cf1e2b7b16328a5605a7ae794f227ee531d5aadfc0976db32f21ccd137c34464,2023-06-27T20:14:35.760000
CVE-2022-38750,0,1,2f7c92a1718c59f573752abb16c9289e3032a332b345502060498e5686749d69,2024-03-15T11:15:08.003000
CVE-2022-38751,0,1,a416fbc78a45e508d7116c29cf8757596ed953ac410275688de6d96a3cf54398,2024-03-15T11:15:08.107000
CVE-2022-38752,0,1,05b7ba1c9eed764f576263cc847a695022e102a198144e1a3604fef1bd6f152c,2024-03-15T11:15:08.207000
CVE-2022-38750,0,0,2f7c92a1718c59f573752abb16c9289e3032a332b345502060498e5686749d69,2024-03-15T11:15:08.003000
CVE-2022-38751,0,0,a416fbc78a45e508d7116c29cf8757596ed953ac410275688de6d96a3cf54398,2024-03-15T11:15:08.107000
CVE-2022-38752,0,0,05b7ba1c9eed764f576263cc847a695022e102a198144e1a3604fef1bd6f152c,2024-03-15T11:15:08.207000
CVE-2022-38753,0,0,c94bddd15f31ec7e6479212331fe29b21a7e6f23e8a64a35952202d158dc3224,2023-11-07T03:50:14.567000
CVE-2022-38754,0,0,e23bd09ecac75629b6e1498a3795546c9f635d904cd7349d73502c83e4dc11f7,2023-11-07T03:50:14.870000
CVE-2022-38755,0,0,e6565e62154784b04d84b3719a22b3022985d12dd26d35583b85eb2a3cc968bd,2023-11-07T03:50:15.163000
@ -206640,7 +206640,7 @@ CVE-2022-41850,0,0,ac2719327c442951e81004fb44267b5552d9e849c14e7e2cdd82ac041f221
CVE-2022-41851,0,0,38327bf12b43b300663bbd04a39065792f284b7ef2c7ba971e60c6a4c14ed902,2022-10-12T14:30:54.330000
CVE-2022-41852,0,0,c3185bfc193cd85841bf371a4e0eef8f173fcfa77037f73356c16e2eb9ff6c9a,2023-11-07T03:53:02.600000
CVE-2022-41853,0,0,24142528e4ad5748c930bf02546b690d251aab817fd312f70be3e8f056855ce2,2023-02-03T23:43:43.453000
CVE-2022-41854,0,1,961808baf88a1c0f72673bdb6a84f008fe51c3df452c7dc75bf179135566a8be,2024-03-15T11:15:08.303000
CVE-2022-41854,0,0,961808baf88a1c0f72673bdb6a84f008fe51c3df452c7dc75bf179135566a8be,2024-03-15T11:15:08.303000
CVE-2022-41855,0,0,dd5f37b919e5019c73957251db258c4f724723075c49805e108ad6fbed83df25,2023-11-07T03:53:03.443000
CVE-2022-41856,0,0,591a39d74f332468a475536e53cb1140f905fbe690af6da1038215b2bd041210,2023-11-07T03:53:03.973000
CVE-2022-41857,0,0,2bfb60dcc3398494f00e6c7072d89aeb78361a08f59c38a1a49886dae6697c89,2023-11-07T03:53:04.530000
@ -229721,10 +229721,10 @@ CVE-2023-42278,0,0,ee0ec18f540f3d23e934e2de8db0f17be345642135a1fcb536e5ed9056b61
CVE-2023-42279,0,0,2b5fd45e3f7b5847cdf94bacf8431811911a70e786a0646743e5feef43384778,2024-03-08T13:15:07.870000
CVE-2023-4228,0,0,3f89c2bd23d86c6631e166d6883e49420ad57a55b32f2055f78a3149f09454ab,2023-08-29T23:36:22.147000
CVE-2023-42280,0,0,998be9ae9db10da8d8bc0c54fc9e9367324bba82590a90bf698705b8218b9c4c,2023-09-25T17:06:48.100000
CVE-2023-42282,0,1,ef96b2ed03e923eaad91fee84d0a54eb9243f524f365d26e2b0f4805d0986535,2024-03-15T11:15:08.430000
CVE-2023-42282,0,0,ef96b2ed03e923eaad91fee84d0a54eb9243f524f365d26e2b0f4805d0986535,2024-03-15T11:15:08.430000
CVE-2023-42283,0,0,a98ae80c6258afcd9dd5fa419aa8d77e55afc9a17fdaaa9bbc1658066c82ea5e,2023-11-14T19:39:46.053000
CVE-2023-42284,0,0,15446465ee77926e88ea059de6b012825a7669d75381bed08ca0074356895815,2023-11-14T20:35:27.577000
CVE-2023-42286,0,1,bb6c64ec4f5cce41c86e9722ebb23286b35c3c60964c1b33d34443bf9bc9bb1f,2024-03-15T12:53:06.423000
CVE-2023-42286,0,0,bb6c64ec4f5cce41c86e9722ebb23286b35c3c60964c1b33d34443bf9bc9bb1f,2024-03-15T12:53:06.423000
CVE-2023-4229,0,0,b52c2fa7e2394d6b42eae83bed29722fab6d4cb85028915ebecc747eee6230f6,2023-08-29T23:35:40.940000
CVE-2023-42295,0,0,76e92c5a31a1c38c774b96fb948b716fe550c55e664576533af49902b5cabeae,2023-10-28T03:19:16.690000
CVE-2023-42298,0,0,007b09605f4ed7b0628f77a85d1e0a7fe95be1f19353799459bee4c90043a90b,2023-10-17T14:11:02.190000
@ -231933,7 +231933,7 @@ CVE-2023-4591,0,0,7b7489e0ef096cb53299a588ee180b9616089c4949cb6afe064035f5525d5f
CVE-2023-45911,0,0,40a6d4a59e32f2704b6b4aa0c83b05852f7a3efa3303de6d634364cd1b9e613f,2023-10-25T13:45:28.653000
CVE-2023-45912,0,0,e7b70d01df1e6b7ed29be6cef3a5d24a0188fc4204e45db25f76f5dd91970245,2023-10-25T13:49:52.877000
CVE-2023-45916,0,0,b4de35a31730ce89637c5d93cae2af2c0f6956624ee8cf845871fb361731df75,2024-01-29T09:15:42.327000
CVE-2023-45918,0,1,33f00f55399e9410b66f853b2e07c334232e97a2facaeb394e496c0ea19cdb2e,2024-03-15T11:15:08.510000
CVE-2023-45918,0,0,33f00f55399e9410b66f853b2e07c334232e97a2facaeb394e496c0ea19cdb2e,2024-03-15T11:15:08.510000
CVE-2023-4592,0,0,81f9ec9c7754df484556128f55402d2b2e5da813e76693d6a2e51c67954d6e8c,2023-11-13T18:46:52.950000
CVE-2023-45921,0,0,645fcaff78feed0e43ec127059f0dcc7feb6d53759818ded268f99ff2c3f84f3,2024-01-29T09:15:42.547000
CVE-2023-45923,0,0,5946dd1d30e5db85cc88e2299cbbf78c4c1c23d4d9e7d4f1539852b51a3b5d93,2024-01-30T06:15:45.300000
@ -233899,7 +233899,7 @@ CVE-2023-48780,0,0,81a46aadc83bef693702f0587720fb307d57733c38a40b0e9a0adbf977d5c
CVE-2023-48781,0,0,0b8167a5eef8ab6e938308c388d4115607ba3ad1846d34aa073b91ec79ad8a40,2023-12-22T09:47:10.017000
CVE-2023-48782,0,0,88145c135f3d36dc2324e589083cb79dceef7bf357c73c33782a57f9910e4f66,2023-12-15T20:01:55.773000
CVE-2023-48783,0,0,ebc0e9b096de11f5bb2feb6ecedfda87f1114290b6bb005e0f4f19fb8a6d2ef6,2024-01-17T18:24:38.617000
CVE-2023-48788,0,0,0f209a451597062eb292f1256b85474a0c13831a23977ba358f7496194430484,2024-03-12T16:02:33.900000
CVE-2023-48788,0,1,431a30b5a4d2d89a6f19f8c64dd0507c284384eda44196b13aaf49cb79224e2a,2024-03-15T14:52:23.887000
CVE-2023-4879,0,0,fa584d11e9766c316d104762d8e4d48a31923cd7ce617f7440b7a809b8dd63fe,2023-09-18T18:58:43.767000
CVE-2023-48791,0,0,4e7d2cae3ad6ba11c4e276624bedca77887a0ee315b409ddadb10bd81db3bb45,2023-12-15T20:09:24.010000
CVE-2023-48792,0,0,a3c17617afe01ace18242f14c2f591f70a09281fccef1129ab04ab7743ac5ed0,2024-02-09T19:41:33.093000
@ -234881,7 +234881,7 @@ CVE-2023-50643,0,0,55614908e29dfbef803e2a46693f5b61b380d013162b4469912eb83807a2f
CVE-2023-50651,0,0,f3844a6f5ec34177bf49b303e4d6646bdb34f27fe11e2bc419d17cac8c4ce604,2024-01-05T18:27:24.550000
CVE-2023-50658,0,0,ee939de97a2ee211949ae65e220d6896984dc72b221c0aca31785e2be4505ace,2024-02-29T13:49:47.277000
CVE-2023-50671,0,0,1b57fef150a331e8baf93e121682c8f5e3d5e2f36f049f9813d69d8ede2ccde1,2024-01-18T18:54:54.863000
CVE-2023-50677,0,1,35b39e12497b0a8e7db71d038544981fc94a7e1ca08173c6951c9deb49f6791d,2024-03-15T12:53:06.423000
CVE-2023-50677,0,0,35b39e12497b0a8e7db71d038544981fc94a7e1ca08173c6951c9deb49f6791d,2024-03-15T12:53:06.423000
CVE-2023-5068,0,0,17fc2eb1388d05163deaaf7983c73a7e5b5c2899de850a7fc45c4a10f1050a74,2023-09-25T16:40:58.693000
CVE-2023-50692,0,0,d40be33e1bfba63c571bb4e9e0096e84e4055246d18dcee958eac39ecd76d8de,2024-01-04T20:25:53.587000
CVE-2023-50693,0,0,f33d0ae19a7d8856fba0e93c0c84708f7a77cf886b027202286c6bccc773a541,2024-03-05T21:15:07.367000
@ -235001,6 +235001,7 @@ CVE-2023-50858,0,0,94d07847a491bbe81a54b6db746f38547b8b9460f13c67d1c03ef5493373b
CVE-2023-50859,0,0,c55b7ebfdad692c446161665ad7f57d5be4c4ffca139aa2ba69fd933143bb7b0,2024-01-04T19:21:18.457000
CVE-2023-5086,0,0,04cab16ae21da525bc5fa3fc2006574bc61344fe24e236a9fe6b2c57761baec9,2023-11-07T04:23:26.530000
CVE-2023-50860,0,0,06bdd35e56b1857cf3d3ff537b3ce562fb9605a6c9659981d4436040d58ad4f8,2024-01-04T19:21:02.913000
CVE-2023-50861,1,1,513130f0fadd21816260070491b883f5fe1e9eaeb44544fa43adc7076bb69eb9,2024-03-15T14:15:07.207000
CVE-2023-50862,0,0,e4cb32b36db0afa0ad6ef97c99a384298b67a311b9652e286e4e5ff290075969,2024-01-10T01:12:52.360000
CVE-2023-50863,0,0,c77e5226b7e344c7e1e9dd4386edfcafa55161eef35c2134974fbc700d5b668f,2024-01-10T01:12:42.607000
CVE-2023-50864,0,0,dbb8d20e5f36a035c3156fb7a77589dedbf6adf8027e6048f396876e3395893c,2024-01-10T01:12:35.763000
@ -235327,6 +235328,7 @@ CVE-2023-51517,0,0,1a69e7a8868bb57fe23881af905a555a81020cb04edb85fe9a748430c692e
CVE-2023-51518,0,0,82d2f1d17566273e3d96a161b87d4f3f7567388d39e7cb79eb1a426bdc54e536,2024-02-27T14:20:06.637000
CVE-2023-5152,0,0,2c3f5b0deeae37ff96f4852108cf5d6fc102cc5a9f5bbf14a3b0b902e67c543e,2024-02-29T01:42:12.497000
CVE-2023-51520,0,0,278d7a72857b486e9b0b31b11c49041fe1beb2c693b353f7760792bf09c1e90d,2024-02-06T20:20:11.330000
CVE-2023-51525,1,1,e9a062d606e10db818cb431361b3f83d07db3dd5f6a3f2cfed46fe786295de82,2024-03-15T14:15:07.457000
CVE-2023-51527,0,0,6cb4ff038359f6e44ffc98cebb0259b94fe40cd1a58bddb18fc1cd2b63f324d3,2024-01-05T18:13:46.270000
CVE-2023-51528,0,0,9dfa54b303eb56104b42c24d77fae5eea4f23b1ed226c56c1b41872b1d7aec3d,2024-02-29T13:49:29.390000
CVE-2023-51529,0,0,f1431d628580aaae90dc3558b09f51395840a04ba474ae8bd49d2f4fca4b448b,2024-02-29T13:49:29.390000
@ -235823,15 +235825,15 @@ CVE-2023-52430,0,0,d42ac76eff7e870ccd425430baec924966d37450b40a663564ae4a320330f
CVE-2023-52431,0,0,c693cbe76127faa54716f414936fa58bc8929839973e4bd5352d442ea2d0fbba,2024-02-13T14:01:07.747000
CVE-2023-52432,0,0,e1d380fbb265614fea5d100f2d4330b94e2c0e2793fb6bfcf16b790141380ced,2024-03-05T13:41:01.900000
CVE-2023-52433,0,0,1a0cb05542d0c79456ce86a71a378df73e7a3f74f8da709b843dc9ea6d882dfa,2024-02-20T19:50:53.960000
CVE-2023-52434,0,0,1a2a94b389d20b6cf6ba0416a76f36fbfe55da2e658135cd285b8105cc02d1d0,2024-03-01T14:15:53.143000
CVE-2023-52435,0,0,4a326a1f08853c190e3f60720e4a43adfa9ae64091785e27c72d216e731f1c3f,2024-02-23T09:15:22.190000
CVE-2023-52434,0,1,5d52612c26fee7b14653aeb9fd0e234de51ea4d52e7c788aef26856ca04a039a,2024-03-15T14:21:29.950000
CVE-2023-52435,0,1,93ff57cc29918e833611e81b89e4ae0482ae349c7e83a8ab64e2ebbd978f4b55,2024-03-15T14:06:17.587000
CVE-2023-52436,0,0,96f7114e19431af0a0b95791e5cff25753f280edc668cb19fd284740b4aec928,2024-02-20T21:52:55.187000
CVE-2023-52437,0,0,91d3cc3a51673e754e25f139cf45e627b67188a0988727604c925b81f4f0227e,2024-02-22T13:15:08.020000
CVE-2023-52438,0,0,82f5e4215f700ec09e3074e4cca5a58af98120a2d210f484630c55c5aa023aca,2024-02-20T21:52:55.187000
CVE-2023-52439,0,0,b9a5f88a17e67701fb8ac10fcf5d42a79d484bd6742ce98b0c54afea50c4fe63,2024-02-20T21:52:55.187000
CVE-2023-52438,0,1,320b81973417672f06fe062915e89ef0ec0fe09ac9641be89e9ceb9cc678c91e,2024-03-15T14:03:51.503000
CVE-2023-52439,0,1,1acb61b0653d7d06078084524dd22a72646c2e70fb118450a15ea65c12a46971,2024-03-15T14:21:10.847000
CVE-2023-5244,0,0,2d7ccf46570f7a789336019a996859f3eea1c41d32a5a30c878bc5f986cf3b6e,2023-09-29T17:53:12.883000
CVE-2023-52440,0,0,df1d24f58b5780781d166f03e5bbee989af213ed28e43bfb8a74e059b4a6ae50,2024-02-22T19:07:27.197000
CVE-2023-52441,0,0,7349925d74cb6467b47b7b1d276df3eab91f5c1935d4ef85c04b101257863651,2024-02-22T19:07:27.197000
CVE-2023-52440,0,1,7f79ecc423520493b7ea33e872fa5ceb47ef15bacc232c9a528905fdc11fa5b2,2024-03-15T13:44:59.367000
CVE-2023-52441,0,1,29f8dfdafb0665e97721ef99b56f7416e8cc50e990c6b9fd16addab92b75b2de,2024-03-15T13:56:31.710000
CVE-2023-52442,0,0,f0e32f692f04917f9b44f1a58b9cc67efd1d412e7f16caea29f8d0af9ba07f69,2024-02-22T19:07:27.197000
CVE-2023-52443,0,0,d2cfc476b089f8fdcf50f50719540af45f0af66b06ea096a3e3bdb089d114cc0,2024-03-14T20:16:02.947000
CVE-2023-52444,0,0,e4e74b636a9119fb1430d59aa25d18b36c2089ded63e3a22c77190c88140fba1,2024-03-14T20:13:28.070000
@ -237212,6 +237214,7 @@ CVE-2023-6721,0,0,2baa6c13f444a73c8fb708ab0933aa43f74442dd83269a4b99012840f04e4f
CVE-2023-6722,0,0,d32d2d7ab88d7b27501031c246b7de1d18841f9831592e8928e0295e33c59b6c,2023-12-18T17:33:10.883000
CVE-2023-6723,0,0,0256b9a79fe5fd6a26df76092daabbd127e889141255d3fca4ab7e5083681e37,2023-12-15T20:37:10.720000
CVE-2023-6724,0,0,fe9b9f3e5a0c77767c8fbb38c69fe4abc8f7e517abb9a915da744e7f8cd31e28,2024-02-15T18:44:49.107000
CVE-2023-6725,1,1,b72eaa5c9c5a0f48abae55eeb9d2df99fb18c06166a591884648f042aa6af1b0,2024-03-15T13:15:06.857000
CVE-2023-6727,0,0,6ec2c8890148313c75d2521ac9dcb5bcdc679ead10a2731713c6e45c491d3e46,2023-12-15T14:43:08.920000
CVE-2023-6730,0,0,daf67cb33b45f797c478299d62236f8fa267c9e9eab404abeacd1583fccd7584,2023-12-28T17:15:33.537000
CVE-2023-6732,0,0,8e995ef87bd85afefe754d26396da496813fb0ec12bab50f6fc0e73c46e5ca77,2024-01-23T14:59:59.107000
@ -237711,7 +237714,7 @@ CVE-2024-0227,0,0,293cc6e11acf30e33ff683670fd3450332b171ef136e33bb5c8e28161457ae
CVE-2024-0228,0,0,ce6c89afac41f61c47db4c38fe10e22e0a81a5c45ffdb1b44ab12c9bd9185c4b,2024-01-09T17:15:12.223000
CVE-2024-0229,0,0,e6bf7db3b09f9868a2b3df4f8f27cb4ed3c692375e7efc4fb03d84e5d778908f,2024-02-09T14:31:23.603000
CVE-2024-0230,0,0,0ed95f328d6a9b1575e5cfa228e1d818590393567da3497a9c16bfb4b412b523,2024-01-19T18:35:52.493000
CVE-2024-0232,0,1,cc0880bd0343b8160892da7b4e37c3089d940d3ddc268fdf06f6a8f527fd9f25,2024-03-15T11:15:08.560000
CVE-2024-0232,0,0,cc0880bd0343b8160892da7b4e37c3089d940d3ddc268fdf06f6a8f527fd9f25,2024-03-15T11:15:08.560000
CVE-2024-0233,0,0,5dc41a8872508ea2109cbef39ae4ca35aea786fff68fbcd8d1e30c28d52ef8b5,2024-01-19T14:28:14.077000
CVE-2024-0235,0,0,31ec0e84bd14770b88729768ca64700da82ea5e5ec69d9d96962a4380b4ef26c,2024-01-19T14:28:22.047000
CVE-2024-0236,0,0,c4ea74a32a78a6547a8a84af52c815270ada99253269b7fa84272cfa10dba7ca,2024-01-19T14:28:41.540000
@ -238187,8 +238190,8 @@ CVE-2024-0798,0,0,2f1b0b827ba8873a7b25770613534b3f8d6a0f026296e59c448002f5144077
CVE-2024-0799,0,0,565bc32cefccc7b54c8a2a9ae87b575853af295d8bcf02c26770d29b4f9124c3,2024-03-14T12:52:21.763000
CVE-2024-0800,0,0,d01951efcbc246e656d94cfc618f67e25f655df800a6a24c24ab44bafa9ef9ed,2024-03-14T12:52:21.763000
CVE-2024-0801,0,0,a89dd8886cf81b019461340c433bdec2c4bcb02d2b385117b1316445faec54f0,2024-03-14T12:52:21.763000
CVE-2024-0802,0,1,8a8354942e43ddf1114b5fc54e43fdb66ebd6f66eb74144035f3a566ca4193d2,2024-03-15T12:53:06.423000
CVE-2024-0803,0,1,972943007faa1afd1c11dd3aae04f5ce91aa41b928830da8adeb2dbe4bfa7ba3,2024-03-15T12:53:06.423000
CVE-2024-0802,0,0,8a8354942e43ddf1114b5fc54e43fdb66ebd6f66eb74144035f3a566ca4193d2,2024-03-15T12:53:06.423000
CVE-2024-0803,0,0,972943007faa1afd1c11dd3aae04f5ce91aa41b928830da8adeb2dbe4bfa7ba3,2024-03-15T12:53:06.423000
CVE-2024-0804,0,0,70935988ae140dfc2a5adfcb943faf94a39f18e0935f58c282d47a399ed09108,2024-01-29T14:29:25.953000
CVE-2024-0805,0,0,479c25c464f6a328d6731c12cfc75b50b35f0f2dec0194359c3aeae6dde0d30d,2024-01-29T14:24:19.087000
CVE-2024-0806,0,0,9c93ca7b1341b35e16a22cdbbee1fe7fe1f2eaf26781f684014c115afdc39972,2024-01-29T14:24:48.090000
@ -238229,7 +238232,7 @@ CVE-2024-0853,0,0,72eb57fa9d91eeed9b78ea6861ab48b720d6a39710ade722cce53b9624df3b
CVE-2024-0854,0,0,b2a19a635a88b4ff68549abb31f11c392c07f9e329d9704350bbb3ee75810c41,2024-01-30T17:01:37.127000
CVE-2024-0855,0,0,fee06b61accc977f963cdb2b2ef743d4f7ee62d05033c371692bc8e3d7ebf823,2024-02-27T14:20:06.637000
CVE-2024-0859,0,0,ebdbbfb62fdac702a888e13ac2f08cf009b152778d43282d960af2d2fbc4e23d,2024-02-13T19:45:29.770000
CVE-2024-0860,0,1,00bbcd6c65f213eeeceffda8243a1a6631ac3559dfbca28d155a8f476f1aeb6d,2024-03-15T12:53:06.423000
CVE-2024-0860,0,0,00bbcd6c65f213eeeceffda8243a1a6631ac3559dfbca28d155a8f476f1aeb6d,2024-03-15T12:53:06.423000
CVE-2024-0861,0,0,896e71725cbfb614341352655e0b66e7def84c2617b58556401d4278cc8b74b9,2024-03-04T20:26:41.663000
CVE-2024-0864,0,0,17024975930493e251806bb80b57b820a57bfd49c0ac48954296f7125d5de83a,2024-02-29T13:49:29.390000
CVE-2024-0869,0,0,39eb12d4def5ace38cccd71318a17cc1945f05a59b2d0897303b6745b871b84d,2024-02-13T19:45:09.783000
@ -238769,7 +238772,7 @@ CVE-2024-1707,0,0,c7acff8660e1825b1c485d2f7220505bc397dfb5733debf4e42c43a4bfec2d
CVE-2024-1708,0,0,146e7b2e6e4cd14d7a500c32b14e4d15b261c88faf38d2dba04ed7811ca58395,2024-02-22T15:19:39.123000
CVE-2024-1709,0,0,2a24ee712d1d811f95e92e49cc0cd5598b50a33a0581a3e0bdba9d2a43db38c2,2024-02-23T02:00:01.867000
CVE-2024-1710,0,0,70a74a96f904da75ac8b72fd56c9d1d88348f443877486657b55e1efe1bd61c4,2024-02-26T16:32:25.577000
CVE-2024-1713,0,1,e7d3134bce53c0ac843ba564da06176e57d02e074ee162a0046f51a226503b96,2024-03-15T12:53:06.423000
CVE-2024-1713,0,0,e7d3134bce53c0ac843ba564da06176e57d02e074ee162a0046f51a226503b96,2024-03-15T12:53:06.423000
CVE-2024-1714,0,0,3d41c5b029ddf1f5d2c142d7cc7bb81d52a9f5606a977021cc48dc8d1157889e,2024-03-07T13:52:27.110000
CVE-2024-1719,0,0,bd92ffe7c3f4bf124004e532d326d3643bc62f549595f2a7817efea0dc7c188f,2024-02-28T14:06:45.783000
CVE-2024-1720,0,0,3f534b1db2e7b75966562da6fb1d468afac7b86b23a312961b1d896997e21de8,2024-03-07T13:52:27.110000
@ -238806,8 +238809,8 @@ CVE-2024-1786,0,0,449ec13e35f750939f24803b2ef55c495bc451930bfead85c3515bd3cd68c4
CVE-2024-1788,0,0,880181e49a800669246c4d4cd32ccd361560cda70996b821fd2bf7b522fa9d8b,2024-03-04T13:15:44.523000
CVE-2024-1791,0,0,5d3b6b544d9930344476e785dc53de0e62748b437e39c14583d8b6dbe65900d0,2024-02-28T14:06:45.783000
CVE-2024-1793,0,0,77e4384a73b63366cc7a82d39793c93c7895932d395595c11733397f9a5e5553,2024-03-13T18:15:58.530000
CVE-2024-1795,0,1,afbe1ad94101265276f210002545443389376fc607d6633b7de261da3ddb92bc,2024-03-15T12:53:06.423000
CVE-2024-1796,0,1,117057a7b5e6b573e83fab690d07e65620c4bfdef2545e3c4decb951155d8d39,2024-03-15T12:53:06.423000
CVE-2024-1795,0,0,afbe1ad94101265276f210002545443389376fc607d6633b7de261da3ddb92bc,2024-03-15T12:53:06.423000
CVE-2024-1796,0,0,117057a7b5e6b573e83fab690d07e65620c4bfdef2545e3c4decb951155d8d39,2024-03-15T12:53:06.423000
CVE-2024-1802,0,0,fc49d6852e2d9c806d87bd476c49eb44290671042d27cb531abfd095f2e45f37,2024-03-08T14:02:57.420000
CVE-2024-1806,0,0,73f76c289a42538b0e30741cbd9c42340b0dc0b9404f8627ff555054eb7d9696,2024-03-13T18:15:58.530000
CVE-2024-1808,0,0,2da113a6f87d1b28b926abe8dc4a1c1454247327ae44f0a848973179ceb1addc,2024-02-28T14:06:45.783000
@ -238833,7 +238836,7 @@ CVE-2024-1834,0,0,71484c054cc8716550405a2212257a1bb19512d3ccfc712afddd01b2d896ef
CVE-2024-1843,0,0,979d0dff9637d9cab00bf6a14f591ee68b79b4ec3300ebdf02b15cf0e8a60188,2024-03-13T18:15:58.530000
CVE-2024-1847,0,0,152f4d845ce8c23980172297d934e8efa3d32af4a304d4db000f4175545dd48b,2024-02-29T13:49:47.277000
CVE-2024-1851,0,0,ac07ab34f3e596527407cf2fcb93e785fa1a213045982c8aadd05f9e543a11a5,2024-03-08T14:02:57.420000
CVE-2024-1853,0,1,d8883604ae63cf7a1fbe4fa65bd3207340a5327b7afe017b25b83cfed4793944,2024-03-15T12:53:06.423000
CVE-2024-1853,0,0,d8883604ae63cf7a1fbe4fa65bd3207340a5327b7afe017b25b83cfed4793944,2024-03-15T12:53:06.423000
CVE-2024-1854,0,0,67720ca675e573934fd73c30069aead563244277f4e5c6d2e86973e2c6bd9b5b,2024-03-13T18:15:58.530000
CVE-2024-1859,0,0,c19a8bbad570254357ebcf90235dc1b7204181d3a1a12c804d832963f66d9a08,2024-03-01T14:04:26.010000
CVE-2024-1860,0,0,53b7775f88dbda3fc2d4abeb2e913e87a2f0c7e010f7824d10356d98445fd8c8,2024-02-28T14:06:45.783000
@ -238869,9 +238872,9 @@ CVE-2024-1907,0,0,674a8f990612fbd789e8b29e4f4db555efa2966321d7535d44b4ff9d82432e
CVE-2024-1909,0,0,12e32b499c59433d30e6ac050b3983e16567b85d72e6d218e26a62327a6048b6,2024-02-27T14:19:41.650000
CVE-2024-1910,0,0,211f272c3ce02464501561e3549f84db9f1611eadb733262f278463e5a2128b8,2024-02-27T14:19:41.650000
CVE-2024-1912,0,0,3c8c0a0238b829a76fd9478bd9956e4a11490ac17d1dddd78b43604a20598ec4,2024-02-27T14:19:41.650000
CVE-2024-1915,0,1,1fa31b2864a79ff8a316a28989e5764264b34a91cf5014f736194b65ddc570a7,2024-03-15T12:53:06.423000
CVE-2024-1916,0,1,88719f1bd0f5b79729b388c51f5164c12fd7f3687b99a8e71e104ac18ecb5a31,2024-03-15T12:53:06.423000
CVE-2024-1917,0,1,2e77801aee1fcb23eb93c439df2a04ed35c1a65d50f13ddabaf21f53e0c8bcb2,2024-03-15T12:53:06.423000
CVE-2024-1915,0,0,1fa31b2864a79ff8a316a28989e5764264b34a91cf5014f736194b65ddc570a7,2024-03-15T12:53:06.423000
CVE-2024-1916,0,0,88719f1bd0f5b79729b388c51f5164c12fd7f3687b99a8e71e104ac18ecb5a31,2024-03-15T12:53:06.423000
CVE-2024-1917,0,0,2e77801aee1fcb23eb93c439df2a04ed35c1a65d50f13ddabaf21f53e0c8bcb2,2024-03-15T12:53:06.423000
CVE-2024-1918,0,0,1bafa8f12a3e1e89cbdae2d567e58d0f2dd7fa8d62ec65a26fca54b119ab135d,2024-02-29T01:43:56.517000
CVE-2024-1919,0,0,72d56d7edb3e5a5021c1ed22bcc46eb2a75ae4941d6cc2cec5dac07191166356,2024-02-29T01:43:56.607000
CVE-2024-1920,0,0,609fbe0726b7e3b7b8c9d1e9070e8f3b7491975accc744191b84356320447097,2024-02-29T01:43:56.683000
@ -239504,7 +239507,7 @@ CVE-2024-21794,0,0,5140601c591fc7e01c922f6b4426d49907b4278c42a623419c59c4c96fa7a
CVE-2024-21795,0,0,8f8b465c9c098b0486c8d3a422710444a0bf1254314ad2cce00f5cb6633448c5,2024-02-20T19:50:53.960000
CVE-2024-21796,0,0,ad6ea83e4ba68ed8909637d1ef7b65d12f04c56232c1b05d9173891b89591836,2024-01-30T22:14:16.247000
CVE-2024-21798,0,0,f6b1c3b51bfe93bdfac8ebe499d7027ef38a497aacd0c971587b98e3900bec13,2024-02-29T13:49:47.277000
CVE-2024-2180,0,1,f29f310f994bdc1547d14907db3ea5b567d0e701ee0c912abfad5bc40b39a210,2024-03-15T12:53:06.423000
CVE-2024-2180,0,0,f29f310f994bdc1547d14907db3ea5b567d0e701ee0c912abfad5bc40b39a210,2024-03-15T12:53:06.423000
CVE-2024-21802,0,0,2a0324ca9760c4b3be107883f84a1ed806e6bad72b3badb393d00982ae57c159,2024-02-26T18:15:07.290000
CVE-2024-21803,0,0,412e1fe487e1aa8e1b208c7f0baf850a3bb5b2cd1ac7cabb6ce669e7a4281bbb,2024-02-08T01:57:53.770000
CVE-2024-21805,0,0,a52828f65b6509bde8b488130919a2fdb0ba808c102ed9f4fd4334d154ad08a0,2024-03-12T12:40:13.500000
@ -239534,8 +239537,8 @@ CVE-2024-21885,0,0,2ded91db474abcb1cfa7458555f469a31dde320770425e9a420b652d27c56
CVE-2024-21886,0,0,c2d6842412cf7edd7910975db0735ae154eb1bf10c1a3e7de2b56796a6f73429,2024-02-28T14:06:45.783000
CVE-2024-21887,0,0,27308d07d43795d3f4289d79a64af5933e89a71cf679d41be9d0c5a30a308379,2024-01-22T17:15:09.523000
CVE-2024-21888,0,0,eafebd7f30818e8036790fc3c83d6cd7cc7a89b258668430c4b64c79614679d2,2024-01-31T19:53:06.303000
CVE-2024-21890,0,1,d0d6d1a152080740d6ba84ad392a919d70445665b25a7f6969e602652f189cf2,2024-03-15T11:15:08.687000
CVE-2024-21891,0,1,e424ef0f7a416dd53e40d650cdce75de43c958a1f5dba4ec358496f75617d5f2,2024-03-15T11:15:08.753000
CVE-2024-21890,0,0,d0d6d1a152080740d6ba84ad392a919d70445665b25a7f6969e602652f189cf2,2024-03-15T11:15:08.687000
CVE-2024-21891,0,0,e424ef0f7a416dd53e40d650cdce75de43c958a1f5dba4ec358496f75617d5f2,2024-03-15T11:15:08.753000
CVE-2024-21892,0,0,e9e7cd547b9c865ef0f7d643a8d56e423d474c52d8079510bad9fcfef1233a4d,2024-02-20T19:50:53.960000
CVE-2024-21893,0,0,2d188d3c7852b895bab2eb60f33b22f9fc7e1606c5595723c82f7fae54df9f67,2024-02-01T02:00:01.187000
CVE-2024-21896,0,0,f2e89bd11f46e09b5e1cac8d09f61e5326ff446268c7f7ea5ae718519ecd8d4a,2024-02-20T19:50:53.960000
@ -239565,14 +239568,14 @@ CVE-2024-22010,0,0,c8be08522110436a9d4fa99d4021d5a2fb6c1481cb50733e6d40fe00f78ad
CVE-2024-22011,0,0,0b600b1e31e74facb27c71d7c9b3f514c8b8b4c777fc0d39f1c7ce9fc8756817,2024-03-12T12:40:13.500000
CVE-2024-22012,0,0,6083637305fc19ea62a8c209ebe6bfac1cd035e045c787ca530a090291dc1971,2024-03-12T21:15:57.953000
CVE-2024-22016,0,0,72bb3341c866069974fe863b6c9e848e25809f5f0697d51cda8a3c348c9671f4,2024-02-07T17:33:12.727000
CVE-2024-22019,0,1,f2437e68c6ddb8f7177f54a0e9f52e5ca8426b13996c7a8a6cfcbbb0d671c60e,2024-03-15T11:15:08.807000
CVE-2024-22019,0,0,f2437e68c6ddb8f7177f54a0e9f52e5ca8426b13996c7a8a6cfcbbb0d671c60e,2024-03-15T11:15:08.807000
CVE-2024-22021,0,0,ba38d4b86a2c5af951f989c7a28594b6207f0b19739ba3d580be6e4d49001bfb,2024-02-29T01:44:04.690000
CVE-2024-22022,0,0,925c0d46bbd39b5d0f2644b5e26e0cd82488a20b7de7cccfa4639e9bb8f60d9e,2024-02-15T18:45:30.887000
CVE-2024-22024,0,0,980d44adebdc63cfe4985efd7aa2ee2044d33423093fc7c9f165c43f20a43115,2024-02-13T15:15:32.193000
CVE-2024-22027,0,0,0822e6ca4a0197c830c667319442a46ae27f8152642de8d7f05f1858eada021b,2024-01-18T20:02:46.993000
CVE-2024-22028,0,0,8abd1038154eaf5ca23784f859ed6e719a17c93e427bf707fe61eab823cdcecc,2024-01-22T20:22:47.847000
CVE-2024-22039,0,0,ef8c56b19d2a3b2c57a146991f2128767113626aa58dc9954ac8669d3630e403,2024-03-12T12:40:13.500000
CVE-2024-2204,0,1,f2361237c4001e01c13b041357423ddc6e12c61adf05210140f123a253dd047a,2024-03-15T12:53:06.423000
CVE-2024-2204,0,0,f2361237c4001e01c13b041357423ddc6e12c61adf05210140f123a253dd047a,2024-03-15T12:53:06.423000
CVE-2024-22040,0,0,7d11f7fb5567534dcb6d5b3b79b8f0abaa376b6da679960f376543715fd2e79b,2024-03-12T12:40:13.500000
CVE-2024-22041,0,0,3a754a682c04a281339ab26bd427f37b021c68ff67ed8d1ced26ab3b349cb150,2024-03-12T12:40:13.500000
CVE-2024-22042,0,0,c5aca849b5ae0d8d5a45ea8ff67dd52ef5ada43150173caa8f5617617296b9fd,2024-02-13T14:01:07.747000
@ -239674,7 +239677,7 @@ CVE-2024-22228,0,0,78d2b6e91237b41440665215c9b4e77ccc8811641b8c3516a01f9391d6778
CVE-2024-22229,0,0,942079f7535239209609b5cbc34a85ff0a40c69533135771fdb6410ce1778e0c,2024-01-30T23:01:36.513000
CVE-2024-22230,0,0,1dba8e437bacd8d1f2a5a22c03d0799f6c41b12fb7346ebf5256856880ee3b1a,2024-02-15T06:25:53.660000
CVE-2024-22233,0,0,0fe59b4b663f0c6d5b9043fb5ee923bedfa271d937aabb2465577a5f1e4e3b27,2024-01-29T17:24:16.230000
CVE-2024-22234,0,1,ed66ea75d4f91bd4cf760a873ffa711eec74e184d0ed1b507bd27dedbdd28669,2024-03-15T11:15:08.857000
CVE-2024-22234,0,0,ed66ea75d4f91bd4cf760a873ffa711eec74e184d0ed1b507bd27dedbdd28669,2024-03-15T11:15:08.857000
CVE-2024-22235,0,0,94dcf649455ce66e40f15519944aa08c6281ad01f157b931cb45eb28dc8bde92,2024-02-22T19:07:37.840000
CVE-2024-22236,0,0,8201be843ca4fddc3e50d61ba00eee488c4be6cba8a9459a0251fd7b88b774f4,2024-02-09T01:01:27.447000
CVE-2024-22237,0,0,e71897597855cd1424c518c72383f574819812eafb673db1067e39ca6ce39465,2024-02-10T04:12:42.680000
@ -239793,7 +239796,7 @@ CVE-2024-22463,0,0,5b884681f5c1cb31ebf38842df7c3075a8e9d98da101d1e4ec4faa1ef09b6
CVE-2024-22464,0,0,890f63b91e1207e51dc2d0fc686f763deb067d6410c523bfc64d52071d75be15,2024-02-15T05:03:27.617000
CVE-2024-2247,0,0,b52dba6f68142dbeca56f2f1bf8b23a5401066ec4f0585445fe0cb42ba284eff,2024-03-14T10:15:07.027000
CVE-2024-22473,0,0,ba695bcad0bbe2cba422f3053697429916506f0f0ce55f150fe9af4a818e1f6b,2024-02-22T19:07:27.197000
CVE-2024-2249,0,1,cf7e9c481ceeab4ebea44cd6aa64f5dbe4abd16900b5ad6fea6a1dcff54afc44,2024-03-15T12:53:06.423000
CVE-2024-2249,0,0,cf7e9c481ceeab4ebea44cd6aa64f5dbe4abd16900b5ad6fea6a1dcff54afc44,2024-03-15T12:53:06.423000
CVE-2024-22490,0,0,36caaa8caefc70cd3fb65a62a9488b2446e68d14844d0a61d7baf757d2000caa,2024-01-29T22:48:35.493000
CVE-2024-22491,0,0,99c25b0ff8de89fe3ebd04368e499e7fe9b3820707560bd21fed90048934c0ad,2024-01-23T14:28:45.890000
CVE-2024-22492,0,0,d5f3c39114d683a19b63c12000afa4d89fabfab5536b09341cba8fab701d6afc,2024-01-20T18:42:47.087000
@ -239819,7 +239822,7 @@ CVE-2024-22549,0,0,9d125f13584b8e9a98c7ba04ebcdd0c32883b8ff51ce2ca12c4e35cf1c2f0
CVE-2024-22550,0,0,f902d83073addd3a776ed36cb4649f966b6484d16d8386f091439ccd6c55a4c3,2024-02-02T17:14:39.690000
CVE-2024-22551,0,0,79fcc177ff1b11ecc118fd58da1a84094ba022f8d936327b273fc8f04260ffb6,2024-02-01T20:10:53.180000
CVE-2024-22559,0,0,47254ebdbd259f1c38f8ed3eecbaf91c57cad6163fd30fc26c430e3cd2eb7381,2024-02-02T02:03:48.573000
CVE-2024-2256,0,1,f8fd57ec7ff6633dc90410eddd2a90616aa5e7d36e0072f4031a2bc404da991d,2024-03-15T12:53:06.423000
CVE-2024-2256,0,0,f8fd57ec7ff6633dc90410eddd2a90616aa5e7d36e0072f4031a2bc404da991d,2024-03-15T12:53:06.423000
CVE-2024-22562,0,0,fbcf5332a9ae5bd938c146408ac3cbda0023927af7c1ecabde813ca87b9348d0,2024-01-25T20:22:03.963000
CVE-2024-22563,0,0,e68d7fb0548f09a5ec2c02ea3bc2e400b99a4a7ece951a19b220371a41585758,2024-01-25T22:19:08.390000
CVE-2024-22567,0,0,37499b14fc95be5de51f415505f023a34c878497b34bd94665d0d5d9fc0f3959,2024-02-14T19:54:19.663000
@ -239958,7 +239961,7 @@ CVE-2024-23061,0,0,d40b225d92d8f0f0d47201622b24e50bc3550ed3e56a2682a133a8aeae502
CVE-2024-23094,0,0,9f79dbaa28554230ecec6bf9c8ebad70b78370379f350d8ce65fe4447a3b2f3f,2024-02-22T19:07:27.197000
CVE-2024-23108,0,0,4bd66ae4e2150cd9c3073e095bacf489de77af9a273b611e130c3e3fa4edf7ea,2024-02-07T15:02:00.203000
CVE-2024-23109,0,0,c2686a38cd2651bfef8ab0e98ee0dbcce98e98fd7c1f1805290cb9df9c03fe78,2024-02-07T15:04:28.237000
CVE-2024-23112,0,0,94dfeeb97ac3ddeed6a2e0061f0ac178814740587a740ca0cd04282ff8354503,2024-03-12T16:02:33.900000
CVE-2024-23112,0,1,db97de9e46492b481e52ee1e1883233ddfe5123c1ba448f0e59ac92baa6de68f,2024-03-15T14:51:58.497000
CVE-2024-23113,0,0,29903cf0008dd4023f7698dfe9b07a61d8c5e19cfdea1fb0ce14ef659e7383ed,2024-02-22T15:33:00.970000
CVE-2024-23114,0,0,fa8f95e0e83961a881a09cd70451012be00683c9d1e43570d7214d2ff680cc51,2024-02-20T19:50:53.960000
CVE-2024-23120,0,0,1fdd5384a3247451b572eec50acc63b80f4302d338e02a15db81dbcc92866844,2024-03-01T16:15:45.920000
@ -240387,7 +240390,7 @@ CVE-2024-2393,0,0,88d7ea46d41b8a62f530c69db99a66fd82ab7526c083e60b1939a19c5a484a
CVE-2024-2394,0,0,a1808c3e423b31a5f61767caea3e96f7bde3f2a439710708c637f27d2a25cf41,2024-03-12T16:02:33.900000
CVE-2024-23940,0,0,88f3246b7d729e9740dbc7accb734f511d890171cb976d7dde750494e61216dd,2024-02-06T19:19:33.920000
CVE-2024-23941,0,0,12a475e2ca4f3cbb312854167865e0f548c636a650b921a0048a701032c53d0b,2024-02-06T21:37:12.433000
CVE-2024-23944,1,1,d7189cd17bc8529e11b77c38b3cbb5d227e8a7f862bb2fe75d66b288543ad7bc,2024-03-15T12:53:06.423000
CVE-2024-23944,0,0,d7189cd17bc8529e11b77c38b3cbb5d227e8a7f862bb2fe75d66b288543ad7bc,2024-03-15T12:53:06.423000
CVE-2024-23946,0,0,32194d05d3f7a3a80cd0b416a872a66ff74b3120ea9e0897100b1fe32331e71d,2024-03-12T17:29:17.243000
CVE-2024-2395,0,0,1fdafc69366cd072c6108b6d86410a63c85cce9eeaa62bcac076c3a2bc3a1766,2024-03-13T12:33:51.697000
CVE-2024-23952,0,0,89289c4c1b03193a134cbe14ed609452617a970c4d8ae9dfbad6f91cd36db610,2024-02-14T14:16:07.460000
@ -240396,7 +240399,7 @@ CVE-2024-23978,0,0,dce24325560fbd2c8a4b55826a990c779123e234941d6c9decad894b94e08
CVE-2024-23979,0,0,5e1dc647eec92472a586c7319077fa782b48d632d4a171a926ee19c9f0ee9a24,2024-02-14T18:04:45.380000
CVE-2024-23982,0,0,b14ba0205dd1f33ce2faf143ef8b9750d0c0a19e31571fc2532f719ca5f2eec3,2024-02-14T18:04:45.380000
CVE-2024-23985,0,0,258f4468fe9f37b9a6c2732e57d96bdd80375c2f3603af19ad729cbcccfb8b72,2024-02-01T17:33:41.777000
CVE-2024-2399,0,1,6f8fb1e3be26b1339d174325c835cf0d1371f9e848d17aa9846a8738e0086de0,2024-03-15T12:53:06.423000
CVE-2024-2399,0,0,6f8fb1e3be26b1339d174325c835cf0d1371f9e848d17aa9846a8738e0086de0,2024-03-15T12:53:06.423000
CVE-2024-2400,0,0,a3559f292416a7177d55cf2300155f3e2cebd6068dd39e4a19e49113027fe34d,2024-03-14T03:15:09.323000
CVE-2024-24000,0,0,c0e25ee371e3e2954ce1c31994df30792949134b707de19bf25452c7e2c5373a,2024-02-13T20:30:10.053000
CVE-2024-24001,0,0,ee1c723e23fc182642c00ee71c6c1dbca341b34ff9a2a69da4bee1c4da91e395,2024-02-09T02:10:25.807000
@ -240527,8 +240530,8 @@ CVE-2024-24398,0,0,f4bfb9d92cdfc220b232a85deeb8216b709f2d184cff7e693fbf714bca45d
CVE-2024-24399,0,0,353ec2da6e48e6292145d6b75abe75b7e4722004c5ee075b39e05af1ecc581a2,2024-01-29T15:57:59.413000
CVE-2024-24401,0,0,ec06c8cf90df05f5e4115d49f7ce6be6908f7d5473423eaeaae838929ca6fe04,2024-02-26T22:10:40.463000
CVE-2024-24402,0,0,97bd4ff0a8ca6538f4d318e89076733036a976638fa55c2c6b338003bd50f01d,2024-02-26T22:10:40.463000
CVE-2024-2445,0,1,3aece2c7d99f4f988e852fe4d4830ce49e1f7b44f3ea5261c934033985be71a4,2024-03-15T12:53:06.423000
CVE-2024-2446,0,1,5333d17fcaf02150b804f8573c04d1f6063740622130e6fa314d960f427bfd4e,2024-03-15T12:53:06.423000
CVE-2024-2445,0,0,3aece2c7d99f4f988e852fe4d4830ce49e1f7b44f3ea5261c934033985be71a4,2024-03-15T12:53:06.423000
CVE-2024-2446,0,0,5333d17fcaf02150b804f8573c04d1f6063740622130e6fa314d960f427bfd4e,2024-03-15T12:53:06.423000
CVE-2024-24468,0,0,2ffe0e787add87754da9d28139dd49fe0df5af62f9576796ac86e102fb215c8b,2024-02-07T22:03:09.897000
CVE-2024-24469,0,0,4f6c0d02ab780395cc2795972f5ccd070037d1f155bb48f88977ff7315e7ceab,2024-02-07T22:02:57.743000
CVE-2024-24470,0,0,0ed64df001bff16a393bf92778dffdaa6681f7af33a9a33c77cdaa83290d7947,2024-02-06T21:07:34.547000
@ -240545,7 +240548,7 @@ CVE-2024-24496,0,0,d3af8fed4f9dc5ab516231a6a765383283bf96cc93c20c6077308e5e48b88
CVE-2024-24497,0,0,508098c217acb7b8b140ecd382edc9fe44597401eccd971d6c1417d26c569bec,2024-02-12T14:31:34.073000
CVE-2024-24498,0,0,753379bf38359db11676987b60d3fc62d861f4b4d9e21b1906af1fc91bba7195,2024-02-12T14:31:21.610000
CVE-2024-24499,0,0,f3fa195f99d03c816961a79dfcc5225a65897f0a2c13286167d69ca586129263,2024-02-12T14:31:04.057000
CVE-2024-2450,0,1,00768fb37fabbe59aaa05a2b15e979f5b194f2b002bbfb5602d5ad6df849f0ce,2024-03-15T12:53:06.423000
CVE-2024-2450,0,0,00768fb37fabbe59aaa05a2b15e979f5b194f2b002bbfb5602d5ad6df849f0ce,2024-03-15T12:53:06.423000
CVE-2024-24511,0,0,c2a15768e4699e22cbf5e8595792dbc9bf48071b723d524443a4f83d9a5c3ab8,2024-03-04T13:58:23.447000
CVE-2024-24512,0,0,03c51f88444f0be6fcfaff8e371681e3a1a1d007832a9bf8fa7088f13cfe5d40,2024-03-04T13:58:23.447000
CVE-2024-24524,0,0,40ecb02cd326bdc34833c61cf5eb3e9f45f526d45502f51591361c36d1938c63,2024-02-09T16:30:43.830000
@ -240637,20 +240640,20 @@ CVE-2024-24774,0,0,5ce184dd523c8effa0bf9ff2cb869eab62ae87eb1154ab58365aadeb9c76c
CVE-2024-24775,0,0,d06506c81c4e07c1022939620db695892cb4401762e4a2787f2944d4645c719f,2024-02-14T18:04:45.380000
CVE-2024-24776,0,0,a113a2303e14c85bd8fbc5e168ceae41e42a3bd77b2e4df344678a7acbeef687,2024-02-15T18:42:25.383000
CVE-2024-24779,0,0,18631c5e58ceb2e9322e72f89a38e3f6c05c74af750000a5fed820d268e6baea,2024-02-28T15:15:09.250000
CVE-2024-2478,0,1,e9bf5ae73a3eccec32ce37111aeee76c8f29fc7e68dbc802ebf9fe55d1cbf6e5,2024-03-15T12:53:06.423000
CVE-2024-2478,0,0,e9bf5ae73a3eccec32ce37111aeee76c8f29fc7e68dbc802ebf9fe55d1cbf6e5,2024-03-15T12:53:06.423000
CVE-2024-24781,0,0,48385a425dcc6c0339feeada61281fd6a5323a74db948e3c0f249af2d3b0cfe4,2024-02-13T15:16:05.223000
CVE-2024-24782,0,0,cec52fb522063b4541c054f611458d0df6c7d32db1a26bd5bb59ee4420900e48,2024-02-13T15:16:05.223000
CVE-2024-24783,0,0,12be64e2db63a036341461fa12b20bbb20b8ea46e325e75c94cfb782663e82b6,2024-03-06T15:18:08.093000
CVE-2024-24784,0,0,5450058de71553b9cf7fdedc345d5ee5f35be919b251db9a4b49d663fd2c521a,2024-03-06T15:18:08.093000
CVE-2024-24785,0,0,7b9073a1f2be203ed1de8c1594434fc8421a0c0316879bd3f71a1253b422083d,2024-03-06T15:18:08.093000
CVE-2024-24786,0,0,9a7cdd8ad660e7a56a83d0409ccc2144904f9d91b9b4d12f7d622b82700c0904,2024-03-06T15:18:08.093000
CVE-2024-2479,0,1,47b3c19b0298507568d5036163a3e382a6395cdee86b21dfccff1f2ad7aa300a,2024-03-15T12:53:06.423000
CVE-2024-2479,0,0,47b3c19b0298507568d5036163a3e382a6395cdee86b21dfccff1f2ad7aa300a,2024-03-15T12:53:06.423000
CVE-2024-24793,0,0,c02d48f5d574325816298b4b1d2848ca92f5dc7aa67a2fd30978e3885630bc1b,2024-02-20T19:50:53.960000
CVE-2024-24794,0,0,0d491c54da3b197a1321ac69102f9de79d058e3462ee7572209ea583555d837a,2024-02-20T19:50:53.960000
CVE-2024-24796,0,0,a14eda4226a58c2c4e1be311d88c2631825b3dc125c63aa2226f772d7e85a358,2024-02-12T14:19:54.330000
CVE-2024-24797,0,0,c19a8ac8bc5c78a5206d6c6bb45c357c3a8b7076e1d1a067b2d060905019e0d6,2024-02-12T14:19:54.330000
CVE-2024-24798,0,0,27adaa65a015e65d65b2afdd5c0a25214a188429d30f4388b6afc3dde21fa6d1,2024-02-22T19:07:27.197000
CVE-2024-2480,0,1,28e577c451b247476a0a7225fd4724f8938ca6fd6a15f996eabbfd72ee472657,2024-03-15T12:53:06.423000
CVE-2024-2480,0,0,28e577c451b247476a0a7225fd4724f8938ca6fd6a15f996eabbfd72ee472657,2024-03-15T12:53:06.423000
CVE-2024-24801,0,0,47915f71445069b208f35a7935b9c510a17f8f452a570f52726f8c5c81b5b647,2024-02-16T16:17:01.713000
CVE-2024-24802,0,0,a1a79b4d1a40c19f0b1fd783e577af4a06bd7c4a6081e664509b96e8417dd1d1,2024-02-22T19:07:27.197000
CVE-2024-24803,0,0,fc5d4f4cab51b4c20d7b6e3bf5587ec068edf5c72abf706c2f7a07ca396460a8,2024-02-16T16:19:58.613000
@ -240658,7 +240661,7 @@ CVE-2024-24804,0,0,eeb6fdfa103bf8168fd7c265cc5d58c5754970ed08409f99ef624c0715efc
CVE-2024-24806,0,0,c22f635b0a8e149aa103df5ec505273138fb224093663def7772242037a61135,2024-03-05T23:15:07.867000
CVE-2024-24807,0,0,2d34e5a71f21b856008e0b8570ab5cdf60822d8a0563980a1edf758417c67389,2024-02-12T21:41:24.647000
CVE-2024-24808,0,0,bdbd983ba6c1a4b09d677aa089f9419ebf22e351f535d11a049fcdc6e3f33540,2024-02-13T22:48:57.290000
CVE-2024-2481,0,1,983535f37db66cd4c3d608cf25bbeee83831f09945d1626dba92323c9c9fa20f,2024-03-15T12:53:06.423000
CVE-2024-2481,0,0,983535f37db66cd4c3d608cf25bbeee83831f09945d1626dba92323c9c9fa20f,2024-03-15T12:53:06.423000
CVE-2024-24810,0,0,9dab4129d1c20588c512bce77a7cc1f7e1b1d517809a86dc2acb61d422d4f488,2024-02-14T20:12:54.643000
CVE-2024-24811,0,0,a42cc7b4d95d752401262af12a58e0c503baff6bc12320ad45002a6cf532b477,2024-02-14T20:26:39.143000
CVE-2024-24812,0,0,e7efa697650eb9b8a9ae2cbb057919a119f2e3cc992b07dc5909cac077f62dba,2024-02-14T20:22:02.537000
@ -240667,7 +240670,7 @@ CVE-2024-24815,0,0,7ef44958e4dccc9b43c5d3676af931e836517878672143ed602e96364ee73
CVE-2024-24816,0,0,0a0fea4c2cc9d7f26e33e3d5240afb81f51bfa58d93bcab2759f33c430974970,2024-02-15T05:01:35.393000
CVE-2024-24817,0,0,fdde672642557a8a2852513b11069618f453ff1b811266148c78822a38a56d95,2024-02-22T19:07:27.197000
CVE-2024-24819,0,0,35941d7444bb12eb303fbe4e6356b4e7c694ff9d77a3a091af78e5d9c718b3dc,2024-02-16T21:34:17.650000
CVE-2024-2482,0,1,31b254ad2a0cb4f1819955be37fd832bd37e244b32e4fdde3bc6c6acb565f816,2024-03-15T12:53:06.423000
CVE-2024-2482,0,0,31b254ad2a0cb4f1819955be37fd832bd37e244b32e4fdde3bc6c6acb565f816,2024-03-15T12:53:06.423000
CVE-2024-24820,0,0,3b801b1febe3947cdc9f4e9b7316023af164bb3cbc08159c83a10386b0e562b8,2024-02-16T21:36:58.440000
CVE-2024-24821,0,0,f214df264f2293ccab3a5b6002616d6e1c0fc596d016ab4f3509d1330c15283b,2024-02-16T21:37:27.557000
CVE-2024-24822,0,0,635c30cc08c673ea561185631628373cd19274be3aa6a1832f042b55a0a6da0d,2024-02-15T15:43:07.647000
@ -240677,7 +240680,7 @@ CVE-2024-24825,0,0,d270d838d76c4af232d0ce52669df28a177a81175d698f081f58acbb6ee89
CVE-2024-24826,0,0,24055e3561d59b8a3939c012d5daa6e0d9c3aea14ffdc480c0d82d63ca5e0695,2024-02-13T14:01:49.147000
CVE-2024-24828,0,0,49f3203ef220d83772b2ef2d38603decf2279328e1e01bba81d6a5042632951e,2024-02-16T13:43:33.407000
CVE-2024-24829,0,0,3577cb941a1662429dafc55c4424c0aba88e61b66a2cd724c7c9ac171337142f,2024-02-16T21:37:59.497000
CVE-2024-2483,0,1,8be7d8096983c30adadfa053d096e42f8f79432afdb3f7425a0ca340918b9a2d,2024-03-15T12:53:06.423000
CVE-2024-2483,0,0,8be7d8096983c30adadfa053d096e42f8f79432afdb3f7425a0ca340918b9a2d,2024-03-15T12:53:06.423000
CVE-2024-24830,0,0,0d9adea9164c18f7ff7989d5488b101c9a82392f2b7e4acf1331d044331cbf79,2024-02-15T18:53:54.370000
CVE-2024-24831,0,0,c84e178260bd3abff1690dc35c00a2b3b1eccfdb8ac833753e26fa86bbd36f7d,2024-02-16T16:22:00.857000
CVE-2024-24834,0,0,f1b0afc5b1406c76028e9a1457aaaa7c9c4a1ab2208a1bb8ffbf62e150ea41ea,2024-02-15T03:16:47.957000
@ -240691,19 +240694,19 @@ CVE-2024-24846,0,0,6890a12a2a75edd735a365e4f936d5236ba568d73a773641099ac2fe0c58d
CVE-2024-24847,0,0,b4fa9a61260da316bc833192464fabd12095e29ea013df2a2fb0faf16c78be6a,2024-02-07T23:30:27.567000
CVE-2024-24848,0,0,40caff22a3243fb89666855618bfb8dcbc9fcd477abdaa3c19527de1aee97a51,2024-02-07T23:30:36.817000
CVE-2024-24849,0,0,7310ea40ba14819a766bfed2718d0ae7c9bf655c4a04b330968acbdb73d5a918,2024-02-22T19:07:27.197000
CVE-2024-2485,0,1,2153f15968004316ce519dcde7e2764d62fe794ba016473eda1e07f8cc480ed8,2024-03-15T12:53:06.423000
CVE-2024-2485,0,0,2153f15968004316ce519dcde7e2764d62fe794ba016473eda1e07f8cc480ed8,2024-03-15T12:53:06.423000
CVE-2024-24855,0,0,53926eea6176e5ec7dac755182b92f74698401115acbca0c88724948db080e51,2024-02-10T04:06:40.840000
CVE-2024-24857,0,0,bd0a671ef627655a534b97d40879c56dc0a8ee5f900294aaa10a2d6428455f4e,2024-02-10T04:06:50.263000
CVE-2024-24858,0,0,249d6bf347d8c64c978bec670161d1545cd8d4294041793438e8d2c55804ba1b,2024-02-10T04:06:20.077000
CVE-2024-24859,0,0,e679ba08f49ce2259e6fae9f7247bb624101b65d866a2698d5f41c0ab1e599e7,2024-02-10T04:06:05.623000
CVE-2024-2486,0,1,9ef580228c9b4b5fe57bd8f7afa1ad4b182c88dee54f6f3dc6ac633557c1691b,2024-03-15T12:53:06.423000
CVE-2024-2486,0,0,9ef580228c9b4b5fe57bd8f7afa1ad4b182c88dee54f6f3dc6ac633557c1691b,2024-03-15T12:53:06.423000
CVE-2024-24860,0,0,cc439582f3b205787436e95c2e570817bcdd2c0b521aeea3ff157e2bc11704f7,2024-02-14T19:50:10.803000
CVE-2024-24861,0,0,6b40afdcfeaef4379ad19505bbc3196ca9bd79cff347b2f5b0473b639a0022c5,2024-02-10T04:05:59.040000
CVE-2024-24864,0,0,cb2feb3346fb11cc5b4be9ff84c56cdf4de4a5045cdc4255bc9349b2b8259736,2024-02-10T04:05:22.843000
CVE-2024-24865,0,0,69d1d9e6b7dcdc1a41fcca26c5c38135753d56b8f5d02ca0d16d1408ab64d3a6,2024-02-07T23:30:50.313000
CVE-2024-24866,0,0,7234eb10c2179098475da368126463933a93e4c44ee1e87fac56ce5cbea64b85,2024-02-13T19:48:45.207000
CVE-2024-24868,0,0,e7f14abb86f06eb8a849fd232ff7f12dc608d17b75bfc6f64f2c0bbfd51ed1c7,2024-02-28T14:06:45.783000
CVE-2024-2487,0,1,4ca5472da55e03928f48be008f61a5daee2051808522c475d1ce22687edd2999,2024-03-15T12:53:06.423000
CVE-2024-2487,0,0,4ca5472da55e03928f48be008f61a5daee2051808522c475d1ce22687edd2999,2024-03-15T12:53:06.423000
CVE-2024-24870,0,0,b39acdcce0711487a9081cc9665d4882378e31aa9603afc2ce7a407d6eacb9c6,2024-02-13T19:48:35.953000
CVE-2024-24871,0,0,7929bd8570e26f9c39d1231b81e0525120c731b0a1415309e5364f8936da12a6,2024-02-15T02:49:29.963000
CVE-2024-24872,0,0,fa2594fdb5d0746614a8f20c8074f7685479685549755908db43da65febaf141,2024-02-22T19:07:27.197000
@ -240712,7 +240715,7 @@ CVE-2024-24876,0,0,3412ec71bdbeb06b31836d557387c0bc905744144ffe50082b3b5bf66ccb5
CVE-2024-24877,0,0,2ca89fda7db1c8f959b87a956aa7f8eb617785e1c531dd6e92fe052410c661a6,2024-02-15T02:53:41.823000
CVE-2024-24878,0,0,5c96fc08b674ebb2a329fb182e09d6483bbb49a56ae668f6d267ce41c431787f,2024-02-15T03:01:50.883000
CVE-2024-24879,0,0,5b5b5bf87620f8667e3d64f2e68df998d5ed1de826612ab2b7e1a8ef88d680f8,2024-02-08T13:44:11.750000
CVE-2024-2488,0,1,528409579dffffd5726094a25b7469dcc0e01d1d1130495fba0b34d7dc0dfb44,2024-03-15T12:53:06.423000
CVE-2024-2488,0,0,528409579dffffd5726094a25b7469dcc0e01d1d1130495fba0b34d7dc0dfb44,2024-03-15T12:53:06.423000
CVE-2024-24880,0,0,c09c072607ab4886f4a9aad9bd3a049d854086280fee035d43332e78f56fd75c,2024-02-08T13:44:11.750000
CVE-2024-24881,0,0,0139359b4adb91c8a74807ed4668ec8c28b6f35ffbdc8bdb558ebcdf79f694ee,2024-02-08T13:44:11.750000
CVE-2024-24884,0,0,3be547ad02d5edafd16cdb3e30d3f558c78e079d502479e596507065efaa12b6,2024-02-12T14:19:54.330000
@ -240720,8 +240723,8 @@ CVE-2024-24885,0,0,cf96828bd1e0d8642b5bc72ae1a103792f29d8f132a4d58681b5d711c4fbe
CVE-2024-24886,0,0,040a0013f85a73849a5e9e87e8cb23eb11fbc2fee3776455c71d53478d5c4150,2024-02-15T05:03:32.117000
CVE-2024-24887,0,0,51bb971aeec0ed957f12ca5afaba185f88497169dd14d4b58764bb6f0fa78b3d,2024-02-12T14:19:54.330000
CVE-2024-24889,0,0,160e344fd60146726ab8e77aa791f12196b0392022f8c6908394fea561203d9c,2024-02-12T14:20:03.287000
CVE-2024-2489,0,1,c2f08db985f168bdc461a736b2cb039c1ba106cf2adb6f3003fbe94e10ee8235,2024-03-15T12:53:06.423000
CVE-2024-2490,0,1,96148f262d1152b3d77b12e3486ff1a1af8224fa5bcb69b4ac26d0205ebc9400,2024-03-15T12:53:06.423000
CVE-2024-2489,0,0,c2f08db985f168bdc461a736b2cb039c1ba106cf2adb6f3003fbe94e10ee8235,2024-03-15T12:53:06.423000
CVE-2024-2490,0,0,96148f262d1152b3d77b12e3486ff1a1af8224fa5bcb69b4ac26d0205ebc9400,2024-03-15T12:53:06.423000
CVE-2024-24900,0,0,78084b8a525a74146f1a3d21441f9130184d0ec88af68fc99068c40e48da1545,2024-03-01T14:04:04.827000
CVE-2024-24901,0,0,9e041e0c5e68c2bedc98b95ae11c81b17f7982f78f6dd79805adbe04641e3e86,2024-03-04T15:35:25.673000
CVE-2024-24903,0,0,b786e71962ef97555a8e397cc791b68b34c4c2e99ca71a4e665766a901c645b0,2024-03-01T15:23:36.177000
@ -240753,9 +240756,10 @@ CVE-2024-24941,0,0,3ce7539cc2c00ca21eaf8843bb8dfa494f8daac6c677d25fe85a072b680ae
CVE-2024-24942,0,0,98967e5f253d2f0e2d6c9adde01d5feb324664bac3fce3b7b875de585c5550eb,2024-02-09T01:03:13.453000
CVE-2024-24943,0,0,cecde2b734965816be739f7278af2a22cd088f91f77e60d1e6c087126d44acbd,2024-02-09T01:03:03.970000
CVE-2024-24945,0,0,c6e7443a15ad58b887b66a1afc517e5c6d2b064a4aecae431013860646a47dfe,2024-02-07T17:14:48.630000
CVE-2024-2495,1,1,87240ec1b0a31035f8bd4fe1bcd2e0cfde2010d7e3f27ba6bbd8d27da193c4e4,2024-03-15T13:15:09.500000
CVE-2024-24964,0,0,3c015ff9319add283b75ba9284dbb0964a9d4ce7edb50d2870b6147733f7e6d5,2024-03-12T12:40:13.500000
CVE-2024-24966,0,0,b8b1142fa7a04127bebdbfe2d935a3fd815c1f2bb5c99e70bfcbb30576800e5e,2024-02-14T18:04:45.380000
CVE-2024-24975,0,1,c403197a52452c60ee17afdfbf9edd4a6993ed059ba65add25a9b2620ac53eb1,2024-03-15T12:53:06.423000
CVE-2024-24975,0,0,c403197a52452c60ee17afdfbf9edd4a6993ed059ba65add25a9b2620ac53eb1,2024-03-15T12:53:06.423000
CVE-2024-24988,0,0,5be9c22e9d6c42885be25053a8e3f832fee202eb91ce1cb05a36918eae761d1a,2024-02-29T13:49:29.390000
CVE-2024-24989,0,0,39be90963d0952b8475635420a2f64ca0893f9b2941aa846029d2a39bd57b9e9,2024-02-14T18:04:45.380000
CVE-2024-24990,0,0,f549c5a0bfcab6df0ca6e0a5d66e4c65b77814eac3b9adbe63217da37b030524,2024-02-14T18:04:45.380000
@ -240858,7 +240862,7 @@ CVE-2024-25223,0,0,fed0ee1c93d4da13aa94c11be23fd7ce47331585823cc1398816a42e972c6
CVE-2024-25224,0,0,60a033d8e8f6de71de20eba59193ebdd929b6bf393aa49baa96edb59007a6ae2,2024-02-14T16:13:16.563000
CVE-2024-25225,0,0,b00e13f44ac0134f1fc7e8ea7aab2c5dcadd2e02f8582f1036d69738d9332b6f,2024-02-14T16:13:16.563000
CVE-2024-25226,0,0,97ea8fb758b8c513c8e72ae3403e9f8a56bb02ec88e94afe18fc9fb3fc39daf2,2024-02-14T16:13:16.563000
CVE-2024-25227,0,1,85ee852be11e5546f1e3ce25258807dab448668d51e6dd7deeb508012c478893,2024-03-15T12:53:06.423000
CVE-2024-25227,0,0,85ee852be11e5546f1e3ce25258807dab448668d51e6dd7deeb508012c478893,2024-03-15T12:53:06.423000
CVE-2024-25228,0,0,0239fa4a0a2fc4eb6bb0a1d2903e89a077f9c73228502ccb53d8cf7f226021ad,2024-03-14T12:52:16.723000
CVE-2024-25247,0,0,1833ae291fb426e6ea03731a73288e6521c4f877eb6214fb79e6117118a15f59,2024-02-27T14:20:06.637000
CVE-2024-25248,0,0,ab3d2a3b38abc9eda04104b8736bee6722a7b783d7f7311f9358790a48b160f2,2024-02-27T14:20:06.637000
@ -240947,7 +240951,12 @@ CVE-2024-25554,0,0,a87c08d7479e0670c1de7ac680e974b7c966b7f12d7b309312798a5acd199
CVE-2024-25559,0,0,621d2089e4066088e4f2e7151d4c52b797349073e2e5f4d074059dc172fb61d6,2024-02-15T06:23:39.303000
CVE-2024-25578,0,0,ff68f9ee0e3394b3fa83fe8766f2e044325a5fd043b437de063c0cd80654c610,2024-03-01T14:04:26.010000
CVE-2024-25579,0,0,91953a88eab65ef3b6eb3b0fbea08ce09211ffa83ae8783d4b439f2092b924fc,2024-02-29T13:49:47.277000
CVE-2024-25592,1,1,7e5ba00e5d890182601422469a17f00786fcde9a61c4ed047158b4300fb53b1f,2024-03-15T14:15:07.550000
CVE-2024-25593,1,1,2c5aacf75208e920cc705d4658f842798fd0dcd2769ee9853582bf3522e31b5f,2024-03-15T14:15:07.787000
CVE-2024-25594,0,0,041a8f1098ea8eb68537c88dc97c5b5bc81f29a13cfba102c394bd754ead05ca,2024-02-29T13:49:29.390000
CVE-2024-25596,1,1,0102c1c56e481b13b8f94e092b0cac510535143dc2a30ace497c59950d3a3ddc,2024-03-15T14:15:07.990000
CVE-2024-25597,1,1,e152f482a7f15675e369c979d181f58f05e1af4d3a870b7cfbbee56b0ef94e6f,2024-03-15T14:15:08.220000
CVE-2024-25598,1,1,605fd982754aaa53bea43b6e3f8e58eedfa880e08ab766ba25e9561f0078ef18,2024-03-15T13:15:07.087000
CVE-2024-25601,0,0,81f4fdae91c2e2979380ffdf7201132bd42db70ea50ec659a221655da6bb1b91,2024-02-22T19:07:37.840000
CVE-2024-25602,0,0,6a0412f9e3d86cacfb35a934a8fd793128a0f85212ec26797b187230b94df26a,2024-02-22T19:07:37.840000
CVE-2024-25603,0,0,863f490c7ea22d0d3c701bfeb2e8a36747268d73fdd29bb24261158009a35432,2024-02-22T19:07:37.840000
@ -241070,12 +241079,17 @@ CVE-2024-25910,0,0,46915ce767477cde79dec327c420fb80a93ebb8584c8668c193e9ec22215e
CVE-2024-25913,0,0,adbe1d51d998e7755c9e21c2f8e4899af91a4a0cc057128b5afa1c44996ee3fc,2024-02-26T16:32:25.577000
CVE-2024-25914,0,0,6c21c235c508fdd4e37939a7918e64e3dd4e50979a576bdc305d842a25f11a05,2024-02-13T14:01:07.747000
CVE-2024-25915,0,0,2b3eb3b61519c3cc7ec9c696d86f766a5ba91455b2def2592d7df0099d9b76fa,2024-02-23T16:14:43.447000
CVE-2024-25916,1,1,a1ddedeea2fdb0b8ad3e81fc4ea7c26fd924816e1c78b9e5d53ea37a82602106,2024-03-15T13:15:07.323000
CVE-2024-25919,1,1,9bab28643260a56f5c2ee9fc1143f525b51ea40290e4994aa23ebdd669b95ec7,2024-03-15T13:15:07.563000
CVE-2024-25921,1,1,27d3d64bacf9674f1dd3320dc9193e4217ad3fe3b22e935e2e97d8d8734a058f,2024-03-15T13:15:07.807000
CVE-2024-25925,0,0,01bc086e03bbafe0dfede980aebb8a87a98cfcf8d010c13e69a9feac35eb7490,2024-02-26T16:32:25.577000
CVE-2024-25927,0,0,70ec221cb23fdd951e839b39a19a816e5c7a4881399308a30cbec9cd2c6f2d65,2024-02-28T14:06:45.783000
CVE-2024-25928,0,0,a6060327df403c3c616b275f710271564f7f2534d45ed96b3571c5b2e5121575,2024-02-23T16:14:43.447000
CVE-2024-25930,0,0,0ab8711195d4ca59bae23faf5b938c4832c53808527b8c4f0842867494c69bd3,2024-02-29T13:49:29.390000
CVE-2024-25931,0,0,cced732a62b8661206eb106d5ae979a2d16189f2911f7eaa9ca025496e8df531,2024-02-29T13:49:29.390000
CVE-2024-25932,0,0,b47ba5ecf2a19427a2d0c7404d84cf9b82c7d738bc913534568255e83139261d,2024-02-29T13:49:29.390000
CVE-2024-25934,1,1,c08a19d8da4edbfa5fdf9a4231a783a14abda40d956d1ec9e57d9e1e4dcf6fe6,2024-03-15T13:15:08.070000
CVE-2024-25936,1,1,41ed61c54a84cbe8ab04f5aaca5987168a76577f1a873a720eb1b23b24c7c463,2024-03-15T13:15:08.287000
CVE-2024-25940,0,0,81faf8084be28ad3443bfad1349de788b40c215e318cb61e901b3079aac1c24e,2024-02-15T06:23:39.303000
CVE-2024-25941,0,0,ca1cef65d30f17057b47421c2700ecf50e418e7bf4da35eb3fcc2989f17ef1eb,2024-02-15T06:23:39.303000
CVE-2024-25951,0,0,4cab9db546da1535e7f7aa83987aad28b8aa7aeb3328d636aa2cd78c27a2b2c1,2024-03-11T01:32:39.697000
@ -241138,7 +241152,7 @@ CVE-2024-26159,0,0,8db8f42d5662b161251586cebfdfad3ac7119bf59dcefc0ce4412d5330cc4
CVE-2024-26160,0,0,fa9ab77966a6520f6fd48a75b259529e6a68bdc5f72bc11ac282a7c57a6be71f,2024-03-12T17:46:17.273000
CVE-2024-26161,0,0,179c500caa38708835a1de408543085e57586fd097d7453a1bf1888d48f494e3,2024-03-12T17:46:17.273000
CVE-2024-26162,0,0,abe9736aa1712017432f5ac3cb4f9e06d55b8e6b2899e4fcc1a691ec906deb0c,2024-03-12T17:46:17.273000
CVE-2024-26163,0,1,17384ba1027e861f2af80d0ea19d4aae000f69379a7084be7179fba67b1f8bd9,2024-03-15T12:53:06.423000
CVE-2024-26163,0,0,17384ba1027e861f2af80d0ea19d4aae000f69379a7084be7179fba67b1f8bd9,2024-03-15T12:53:06.423000
CVE-2024-26164,0,0,c529ef056d97ddfa055f4dab67a98e2c243b207609d3b8417d59eb6c8893d127,2024-03-12T17:46:17.273000
CVE-2024-26165,0,0,63d3dcf1b589358d7ead4e45bd2c42171f291333fcff06cba556b682dcc81435,2024-03-12T17:46:17.273000
CVE-2024-26166,0,0,978ab57484f1682cc950150e2b2e40d5b99e83a0da48cc1356ec7b38d0d948ec,2024-03-12T17:46:17.273000
@ -241162,7 +241176,7 @@ CVE-2024-26199,0,0,c783249e58f7a34cdbc3a4a74bdf378194f69958b248f8c80379c0377a914
CVE-2024-26201,0,0,117ccddc353ed4894703f364acf785dd6a24217537e061ef980d1ca56918f180,2024-03-12T17:46:17.273000
CVE-2024-26203,0,0,6110281b9eda03c7d5a8219ec3a2aff67cf54ad90870a79c096fe875f28ea385,2024-03-12T17:46:17.273000
CVE-2024-26204,0,0,413dd43bdbc47045478482b7d3349e3e66b0c3197ca627e0b5f71ae7053c6d3e,2024-03-12T17:46:17.273000
CVE-2024-26246,0,1,229a0d6478eae87edf8816e00563b02e82089fc0fc04e0e1cf7f1270429d5b96,2024-03-15T12:53:06.423000
CVE-2024-26246,0,0,229a0d6478eae87edf8816e00563b02e82089fc0fc04e0e1cf7f1270429d5b96,2024-03-15T12:53:06.423000
CVE-2024-26260,0,0,e265a50d624e832bed578eaaf671225475ee52a0a641253d8d3fa4cc960d0968,2024-02-15T06:23:39.303000
CVE-2024-26261,0,0,0e54368aae0104b528b2c2b10aa27bd070162dbc45df6e809e95785e5efd10d2,2024-02-15T06:23:39.303000
CVE-2024-26262,0,0,6d57968ac2564b388ee7eb2f157289b2d34f808f6708bcc9236e1289de720f6f,2024-02-15T06:23:39.303000
@ -241210,7 +241224,7 @@ CVE-2024-26351,0,0,61b98d66760f09ba8a0757ca890b9ad836349a62d566c880c0eb8336d14db
CVE-2024-26352,0,0,ed876b320273da7c752d57a08640f2d98ce80b026324bdf46d0712ec0097ce54,2024-02-22T19:07:27.197000
CVE-2024-26445,0,0,3735cabd04dab3a1baa3e135ef467df65425520025be25bd7cf66dc1b1b0bf61,2024-02-22T19:07:27.197000
CVE-2024-26450,0,0,e70e1c7044e1447bb73bfa4a556135e1953f1916a7225089ba5c38735bf8ee34,2024-03-09T08:15:06.120000
CVE-2024-26454,0,1,bae0c35b4dfcdbee5c6f4167647fab36cadeab218796adaaf17826bd73693c56,2024-03-15T12:53:06.423000
CVE-2024-26454,0,0,bae0c35b4dfcdbee5c6f4167647fab36cadeab218796adaaf17826bd73693c56,2024-03-15T12:53:06.423000
CVE-2024-26455,0,0,b8d798122eed5fa7dc5e81852b3374f7f4b40339c21e80b998d09e1a756fc71d,2024-02-26T22:10:40.463000
CVE-2024-26458,0,0,4b2bac12846011765db5a8d92c99fed71bd0c8fd706ee4d4f4c7e419547c7ad4,2024-02-29T13:49:29.390000
CVE-2024-26461,0,0,904046a1bdb8d57e836285398ec79f3a5f035120c749bfa545aeddc73ebaca7d,2024-02-29T13:49:29.390000
@ -241225,7 +241239,7 @@ CVE-2024-26470,0,0,dc0db164f8ce3a8bc9a2fa171d923c0f617dfc8790e83bc5c61622a828306
CVE-2024-26471,0,0,7fddf92026a168a390ea36b87da697eab84d57af1da83b920de1166301dbef90,2024-02-29T13:49:29.390000
CVE-2024-26472,0,0,263b6313f3d222b9b664ca4acf33761066c4df1f4a964e3dd263c3bac4f021db,2024-03-08T21:15:07.193000
CVE-2024-26473,0,0,23f27fa8ebd3984f506b7ad69a08bae2d515e7dd11e301086d0681feec0a45c1,2024-02-29T13:49:29.390000
CVE-2024-26475,0,1,ca1da171d57f314c06f011443c195dce7f70866f213870057dd637d4798c4fda,2024-03-15T12:53:06.423000
CVE-2024-26475,0,0,ca1da171d57f314c06f011443c195dce7f70866f213870057dd637d4798c4fda,2024-03-15T12:53:06.423000
CVE-2024-26476,0,0,fc0454504f51fc907b2a35a893877c52153f273304642bf8a5c147e2904eba6f,2024-02-29T13:49:47.277000
CVE-2024-26481,0,0,16c3c7f90cb16f8e754a4977b45d85fc37dcddc5f55bf7f8d07332bb65831b88,2024-03-12T05:15:47.500000
CVE-2024-26482,0,0,f9dca5e4d25904fab509e3ffdf08b74804d7cf4024d86bc77571cf17db2648b9,2024-02-26T19:15:07.357000
@ -241235,10 +241249,10 @@ CVE-2024-26489,0,0,de79f1495737dd1b8577e3e02ec381880aa1980ded294214617e55a244fa4
CVE-2024-26490,0,0,b6f6bbce17cb8b3e0d7ffc74af2883f439e6d11d15d184e2f1a2e43e85a99a1d,2024-02-22T19:07:27.197000
CVE-2024-26491,0,0,73ef4da115c90ed06a18a1a334653b2533761b4f911c3db9814bd0d18285bcac,2024-02-22T19:07:27.197000
CVE-2024-26492,0,0,223ddadc0c7efe7b0886f487630808be0927541c8864c0a1df96647191c41c4f,2024-03-08T14:02:57.420000
CVE-2024-26503,0,1,d0f374031f3bfa957597401c8f88ca58d151627558fd63926354c04ec0b8dff2,2024-03-15T12:53:06.423000
CVE-2024-26503,0,0,d0f374031f3bfa957597401c8f88ca58d151627558fd63926354c04ec0b8dff2,2024-03-15T12:53:06.423000
CVE-2024-26521,0,0,0e3dff2f526dd01b3807e889e548f69877c6fbe716f338bf9b68ff7b3cd2a892,2024-03-12T12:40:13.500000
CVE-2024-26529,0,0,ceb7dffe95e5cd49d7bba0e418c1f06e328c8386f0796095312ed90a87d2d1b6,2024-03-13T12:33:51.697000
CVE-2024-26540,0,1,617635ef0e8a400c648ca8f83ffa7f30619dec90da8a875f959e523aa0d1f776,2024-03-15T12:53:06.423000
CVE-2024-26540,0,0,617635ef0e8a400c648ca8f83ffa7f30619dec90da8a875f959e523aa0d1f776,2024-03-15T12:53:06.423000
CVE-2024-26542,0,0,84bcc676050237f7706e936cd8d9d490aa0a127cdccddbe7afe739c073267e25,2024-02-28T14:06:45.783000
CVE-2024-26548,0,0,7b31129407d10e539a4174451b23a0f83a48cdb246d6dd13af61036fdc95df1c,2024-03-01T14:04:26.010000
CVE-2024-26559,0,0,3b7b5127dd0e422a83fadfb79310bdd57e4fb71532d47a597a5aa1449637c0ce,2024-02-29T13:49:47.277000
@ -241246,8 +241260,8 @@ CVE-2024-26566,0,0,c84607e263dfbb2bafdffa5f1605a228a50fe6eb3d5c21b9f493cf56aab5c
CVE-2024-26578,0,0,631d617cd0985d9923eed32b0cb4b9e9025809830b6a3ca2ef1a468d4f2a7124,2024-02-22T19:07:27.197000
CVE-2024-26580,0,0,716bfe9e7477c84eaf394c6917d0ce79d82ccdb90bad82d0c89b019a7d1ce425,2024-03-06T15:18:08.093000
CVE-2024-26581,0,0,353f24559890ac7b3597bd26d99362ecbfd523a3ec7e2aa7e9d65e75d894e5ee,2024-02-23T09:15:22.563000
CVE-2024-26582,0,0,6cdcf6843f79a1ddc4c2cd0c26ad431557beeca360692c49f2a0f6c51a1d288c,2024-03-11T18:15:18.377000
CVE-2024-26583,0,0,4a300c2895f7117869a919f3cccacc96bcc2b42fd06fde7e43015d0dc24ee87c,2024-03-11T18:15:18.453000
CVE-2024-26582,0,1,3ff5c496d753899c1fc1e8062e53c8f61453498de38167daf1346ce24125ba81,2024-03-15T13:56:41.843000
CVE-2024-26583,0,1,469df0658e18197ed0356dd7a5240250603137d767287de06ec0167d1ae18c2a,2024-03-15T13:05:03.220000
CVE-2024-26584,0,0,628c83749212390e734524e43d20fa678834b7ea9755141f8a3b9cd3762087b8,2024-03-11T18:15:18.503000
CVE-2024-26585,0,0,ab0df1121b4a44ad09abca0cf48007274128e339349339533a7e7946a2e72b52,2024-03-14T20:18:37.957000
CVE-2024-26586,0,0,6adf6fee4513357dce3d48353704f433902e35e2bc7d0ba0f94b639c08b43cd1,2024-02-23T09:15:22.820000
@ -241315,6 +241329,10 @@ CVE-2024-27135,0,0,dc76c2c208b53579d0bb7d97b6b2e7e902c0fb1c8b5922e51dabb309b530b
CVE-2024-27138,0,0,1ec0ded3b41c12b07651e921188be783731716c54fb55c30f65f5b3e8197e8cc,2024-03-01T22:22:25.913000
CVE-2024-27139,0,0,66ddd9efc34252e5e972ac0e5a31e042faa3995b86c5ae6f0f108c10e1d7b562,2024-03-01T22:22:25.913000
CVE-2024-27140,0,0,34daddef6e0d13f2bea16bc1184887cdd01053137a36a3bc5699d2875c449127,2024-03-01T22:22:25.913000
CVE-2024-27189,1,1,ed3831284f329bc5f163703f390cebd316950a244cf976c69ad19e82e34723c4,2024-03-15T13:15:08.500000
CVE-2024-27192,1,1,f915a7c19171c5ba9a4b2641b7adb0ec3be67a586fd1ce5e8e09a181b223cea9,2024-03-15T13:15:08.737000
CVE-2024-27193,1,1,339cbbe22759dc63fcd17ac64c1a8bf67db19f19f49364949cd0c7f54def49d7,2024-03-15T13:15:09.043000
CVE-2024-27196,1,1,5fd4d306583670efb7e2630190733701ea9e9d18073fcf8735d03382892fdb26,2024-03-15T13:15:09.277000
CVE-2024-27198,0,0,e4259fe3d4611134ab5dfb0d4f88f5b563c21b8238f30b4253811838ad004753,2024-03-11T15:15:47.483000
CVE-2024-27199,0,0,3dd3bfb58b796a8c7735f0a6f342852f32998fc13795786d35eb3d4375df0417,2024-03-11T15:15:47.663000
CVE-2024-27204,0,0,2f9f2ac2078c33addc2c698f165f7aff9339fcf3fa26f2cdd29a6de3328c8c2a,2024-03-12T12:40:13.500000
@ -241434,7 +241452,7 @@ CVE-2024-27743,0,0,69a5e2d8c49bcfbf0b9f2f2f3b35b9cf6afe8c9f20e8371fcf519a2d38050
CVE-2024-27744,0,0,c100d4ba8f49a307e8f166c43dcf72396c641c27bc5c30f424e004f4b4c33d3f,2024-03-13T07:15:36.410000
CVE-2024-27746,0,0,6f3ddced2e2b26bef51987507b4e7466957a803a9da415c8c1c8b245cafe1423,2024-03-13T07:15:36.470000
CVE-2024-27747,0,0,eff635f872515818dfe20352d610bb047327d7f6971e953c63bc92feb6bf3ebe,2024-03-13T07:15:36.523000
CVE-2024-27756,0,1,aebfc12c95eee1aa3d95acbf6fc8b0650b6e3d2e490fe1817d1c49f0782fe0c7,2024-03-15T12:53:06.423000
CVE-2024-27756,0,0,aebfc12c95eee1aa3d95acbf6fc8b0650b6e3d2e490fe1817d1c49f0782fe0c7,2024-03-15T12:53:06.423000
CVE-2024-27758,0,0,6abe87e0a8905ac150ade2fec85250ff5e7fbf580c101c16b193b98f7d58141f,2024-03-12T17:46:17.273000
CVE-2024-27764,0,0,a6da085213081f41482d74001d5b27250ddae1567bc465fa0f4b1023f8322f06,2024-03-06T15:18:08.093000
CVE-2024-27765,0,0,c9283b485df441e5cf44e98a2bcaa6921e6b7ae7825314dc1fd3bb862197fb6e,2024-03-06T15:18:08.093000
@ -241457,8 +241475,8 @@ CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8
CVE-2024-27952,0,0,184c933cd3d4f7d9f291de87daadba6c6d2dcb57a0cab449b4798a27658d2d98,2024-03-13T18:15:58.530000
CVE-2024-27953,0,0,9606a5ea342585cc8ea605f674c63e8d870327e37e1ba285dba38be6126632a2,2024-03-13T18:15:58.530000
CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000
CVE-2024-27987,1,1,ce6fd0b1730cd837f285c0aaaa1258cf6aa8505469e7f313401adb363ee7f395,2024-03-15T12:53:06.423000
CVE-2024-28053,0,1,e281ed045d826247c32c0ccef204d2c431b80f755e75c928bfd444d7e8497772,2024-03-15T12:53:06.423000
CVE-2024-27987,0,0,ce6fd0b1730cd837f285c0aaaa1258cf6aa8505469e7f313401adb363ee7f395,2024-03-15T12:53:06.423000
CVE-2024-28053,0,0,e281ed045d826247c32c0ccef204d2c431b80f755e75c928bfd444d7e8497772,2024-03-15T12:53:06.423000
CVE-2024-28084,0,0,2ea238298cc724e9290d5587502d4eedb8db15dd1861547724435b977511956c,2024-03-04T13:58:23.447000
CVE-2024-28088,0,0,d2f20b1069b24ba10d21e8bf3b61c2c6a1c6b345ff59786676752b80abbde7a4,2024-03-13T21:16:00.380000
CVE-2024-28089,0,0,830991c1dd5898b6a817a3f8bb8784922af3636f20b8b62ba1c918d5d83f6f10,2024-03-11T01:32:29.610000
@ -241526,8 +241544,8 @@ CVE-2024-28323,0,0,50ef03c499763d9e671e8f7abe3ff1d91993b3f242ed25d0b2f15c0783d9b
CVE-2024-28338,0,0,9985a0b99abb928b9c829cb29ecce6039c07964aad6d9841c1477c6680f4f9b5,2024-03-12T17:46:17.273000
CVE-2024-28339,0,0,06a7f15d55f22a965683bef17c82587bc073ddf9fa5edb33c38c4cd82d5f37f7,2024-03-12T17:46:17.273000
CVE-2024-28340,0,0,89775fa07d73d115a7392603111ecb04f65799be74b8d41063e67ed0eb97d0cf,2024-03-12T17:46:17.273000
CVE-2024-28353,0,1,775baedd795797f490e1b1e6993861f73b147b03ab9192dc45c3991e71d0561e,2024-03-15T12:53:06.423000
CVE-2024-28354,0,1,74fe43ef76c1dcca1e1b1c82fba189337e4897b537fbb6f698402ef41ffa3ffa,2024-03-15T12:53:06.423000
CVE-2024-28353,0,0,775baedd795797f490e1b1e6993861f73b147b03ab9192dc45c3991e71d0561e,2024-03-15T12:53:06.423000
CVE-2024-28354,0,0,74fe43ef76c1dcca1e1b1c82fba189337e4897b537fbb6f698402ef41ffa3ffa,2024-03-15T12:53:06.423000
CVE-2024-28383,0,0,4ebb5b688ac785b11132be45898bb9d7934c49dcd0ae78bf745a27cbe4cf3c09,2024-03-14T14:21:20.217000
CVE-2024-28388,0,0,f20800f07aee245fbf5408ead00cec9bf5c1f6fde0c58ac0833a4f3740a134d7,2024-03-14T12:52:09.877000
CVE-2024-28390,0,0,c59fe44ce5898e034e8253a1c3bd017a5eae7c1708d584b45d3cdcaf6b6ab3d0,2024-03-14T12:52:09.877000
@ -241565,7 +241583,7 @@ CVE-2024-28682,0,0,2c53ed716809a76ded005fd10ac6d93891dbf2dd9f02238c66f1445af60cb
CVE-2024-28683,0,0,14fce1fb8fe5dd3fb68153125dd387047f48de59cd587ce41acfe8b0e8fa04c2,2024-03-13T18:15:58.530000
CVE-2024-28684,0,0,df89c702874c46527da5dc5bf33ec252c05a69f53466623f5ca04f0566a6cd25,2024-03-13T14:28:45.217000
CVE-2024-28746,0,0,4e08f19b517756fb15fbaf966494c1aeec3b9803b4e2b615b4d5a557eb48c84a,2024-03-14T12:52:09.877000
CVE-2024-28752,1,1,b6856abb589c0fed02798f341901c4f3025e287fced11706e9fa0c89b392cd6a,2024-03-15T12:53:06.423000
CVE-2024-28752,0,0,b6856abb589c0fed02798f341901c4f3025e287fced11706e9fa0c89b392cd6a,2024-03-15T12:53:06.423000
CVE-2024-28753,0,0,73ca850c1b6879daba607bc61d7d16457b56173a47004b8bff799b514a526c36,2024-03-11T01:32:39.697000
CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3b2c,2024-03-11T01:32:39.697000
CVE-2024-28757,0,0,2ea8a9bd701b62a4c7d927e860f5361b09b4376e3bc3bbb014ff5d4ca725cec6,2024-03-11T01:32:29.610000

Can't render this file because it is too large.